1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
|
/*
* Copyright (c) 2016 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/*
* ip/ip6_forward.c: IP v6 forwarding
*
* Copyright (c) 2008 Eliot Dresselhaus
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
#include <vnet/vnet.h>
#include <vnet/ip/ip.h>
#include <vnet/ip/ip_frag.h>
#include <vnet/ip/ip6_link.h>
#include <vnet/ethernet/ethernet.h> /* for ethernet_header_t */
#include <vnet/srp/srp.h> /* for srp_hw_interface_class */
#include <vppinfra/cache.h>
#include <vnet/fib/fib_urpf_list.h> /* for FIB uRPF check */
#include <vnet/fib/ip6_fib.h>
#include <vnet/mfib/ip6_mfib.h>
#include <vnet/dpo/load_balance_map.h>
#include <vnet/dpo/classify_dpo.h>
#include <vnet/classify/vnet_classify.h>
#ifndef CLIB_MARCH_VARIANT
#include <vppinfra/bihash_template.c>
#endif
#include <vnet/ip/ip6_forward.h>
#include <vnet/interface_output.h>
/* Flag used by IOAM code. Classifier sets it pop-hop-by-hop checks it */
#define OI_DECAP 0x80000000
static void
ip6_add_interface_prefix_routes (ip6_main_t * im,
u32 sw_if_index,
u32 fib_index,
ip6_address_t * address, u32 address_length)
{
ip_lookup_main_t *lm = &im->lookup_main;
ip_interface_prefix_t *if_prefix;
/* *INDENT-OFF* */
ip_interface_prefix_key_t key = {
.prefix = {
.fp_len = address_length,
.fp_proto = FIB_PROTOCOL_IP6,
.fp_addr.ip6 = {
.as_u64 = {
address->as_u64[0] & im->fib_masks[address_length].as_u64[0],
address->as_u64[1] & im->fib_masks[address_length].as_u64[1],
},
},
},
.sw_if_index = sw_if_index,
};
/* *INDENT-ON* */
/* If prefix already set on interface, just increment ref count & return */
if_prefix = ip_get_interface_prefix (lm, &key);
if (if_prefix)
{
if_prefix->ref_count += 1;
return;
}
/* New prefix - allocate a pool entry, initialize it, add to the hash */
pool_get (lm->if_prefix_pool, if_prefix);
if_prefix->ref_count = 1;
clib_memcpy (&if_prefix->key, &key, sizeof (key));
mhash_set (&lm->prefix_to_if_prefix_index, &key,
if_prefix - lm->if_prefix_pool, 0 /* old value */ );
/* length < 128 - add glean */
if (address_length < 128)
{
/* set the glean route for the prefix */
fib_table_entry_update_one_path (fib_index, &key.prefix,
FIB_SOURCE_INTERFACE,
(FIB_ENTRY_FLAG_CONNECTED |
FIB_ENTRY_FLAG_ATTACHED),
DPO_PROTO_IP6,
/* No next-hop address */
NULL, sw_if_index,
/* invalid FIB index */
~0, 1,
/* no out-label stack */
NULL, FIB_ROUTE_PATH_FLAG_NONE);
}
}
static void
ip6_add_interface_routes (vnet_main_t * vnm, u32 sw_if_index,
ip6_main_t * im, u32 fib_index,
ip_interface_address_t * a)
{
ip_lookup_main_t *lm = &im->lookup_main;
ip6_address_t *address = ip_interface_address_get_address (lm, a);
fib_prefix_t pfx = {
.fp_len = a->address_length,
.fp_proto = FIB_PROTOCOL_IP6,
.fp_addr.ip6 = *address,
};
/* set special routes for the prefix if needed */
ip6_add_interface_prefix_routes (im, sw_if_index, fib_index,
address, a->address_length);
pfx.fp_len = 128;
if (sw_if_index < vec_len (lm->classify_table_index_by_sw_if_index))
{
u32 classify_table_index =
lm->classify_table_index_by_sw_if_index[sw_if_index];
if (classify_table_index != (u32) ~ 0)
{
dpo_id_t dpo = DPO_INVALID;
dpo_set (&dpo,
DPO_CLASSIFY,
DPO_PROTO_IP6,
classify_dpo_create (DPO_PROTO_IP6, classify_table_index));
fib_table_entry_special_dpo_add (fib_index,
&pfx,
FIB_SOURCE_CLASSIFY,
FIB_ENTRY_FLAG_NONE, &dpo);
dpo_reset (&dpo);
}
}
fib_table_entry_update_one_path (fib_index, &pfx,
FIB_SOURCE_INTERFACE,
(FIB_ENTRY_FLAG_CONNECTED |
FIB_ENTRY_FLAG_LOCAL),
DPO_PROTO_IP6,
&pfx.fp_addr,
sw_if_index, ~0,
1, NULL, FIB_ROUTE_PATH_FLAG_NONE);
}
static void
ip6_del_interface_prefix_routes (ip6_main_t * im,
u32 sw_if_index,
u32 fib_index,
ip6_address_t * address, u32 address_length)
{
ip_lookup_main_t *lm = &im->lookup_main;
ip_interface_prefix_t *if_prefix;
/* *INDENT-OFF* */
ip_interface_prefix_key_t key = {
.prefix = {
.fp_len = address_length,
.fp_proto = FIB_PROTOCOL_IP6,
.fp_addr.ip6 = {
.as_u64 = {
address->as_u64[0] & im->fib_masks[address_length].as_u64[0],
address->as_u64[1] & im->fib_masks[address_length].as_u64[1],
},
},
},
.sw_if_index = sw_if_index,
};
/* *INDENT-ON* */
if_prefix = ip_get_interface_prefix (lm, &key);
if (!if_prefix)
{
clib_warning ("Prefix not found while deleting %U",
format_ip4_address_and_length, address, address_length);
return;
}
/* If not deleting last intf addr in prefix, decrement ref count & return */
if_prefix->ref_count -= 1;
if (if_prefix->ref_count > 0)
return;
/* length <= 128, delete glean route */
if (address_length <= 128)
{
/* remove glean route for prefix */
fib_table_entry_delete (fib_index, &key.prefix, FIB_SOURCE_INTERFACE);
}
mhash_unset (&lm->prefix_to_if_prefix_index, &key, 0 /* old_value */ );
pool_put (lm->if_prefix_pool, if_prefix);
}
static void
ip6_del_interface_routes (u32 sw_if_index, ip6_main_t * im,
u32 fib_index,
ip6_address_t * address, u32 address_length)
{
fib_prefix_t pfx = {
.fp_len = 128,
.fp_proto = FIB_PROTOCOL_IP6,
.fp_addr.ip6 = *address,
};
/* delete special routes for the prefix if needed */
ip6_del_interface_prefix_routes (im, sw_if_index, fib_index,
address, address_length);
fib_table_entry_delete (fib_index, &pfx, FIB_SOURCE_INTERFACE);
}
#ifndef CLIB_MARCH_VARIANT
void
ip6_sw_interface_enable_disable (u32 sw_if_index, u32 is_enable)
{
ip6_main_t *im = &ip6_main;
vec_validate_init_empty (im->ip_enabled_by_sw_if_index, sw_if_index, 0);
/*
* enable/disable only on the 1<->0 transition
*/
if (is_enable)
{
if (1 != ++im->ip_enabled_by_sw_if_index[sw_if_index])
return;
}
else
{
/* The ref count is 0 when an address is removed from an interface that has
* no address - this is not a ciritical error */
if (0 == im->ip_enabled_by_sw_if_index[sw_if_index] ||
0 != --im->ip_enabled_by_sw_if_index[sw_if_index])
return;
}
vnet_feature_enable_disable ("ip6-unicast", "ip6-not-enabled", sw_if_index,
!is_enable, 0, 0);
vnet_feature_enable_disable ("ip6-multicast", "ip6-not-enabled",
sw_if_index, !is_enable, 0, 0);
}
/* get first interface address */
ip6_address_t *
ip6_interface_first_address (ip6_main_t * im, u32 sw_if_index)
{
ip_lookup_main_t *lm = &im->lookup_main;
ip_interface_address_t *ia = 0;
ip6_address_t *result = 0;
/* *INDENT-OFF* */
foreach_ip_interface_address (lm, ia, sw_if_index,
1 /* honor unnumbered */,
({
ip6_address_t * a = ip_interface_address_get_address (lm, ia);
result = a;
break;
}));
/* *INDENT-ON* */
return result;
}
clib_error_t *
ip6_add_del_interface_address (vlib_main_t * vm,
u32 sw_if_index,
ip6_address_t * address,
u32 address_length, u32 is_del)
{
vnet_main_t *vnm = vnet_get_main ();
ip6_main_t *im = &ip6_main;
ip_lookup_main_t *lm = &im->lookup_main;
clib_error_t *error;
u32 if_address_index;
ip6_address_fib_t ip6_af, *addr_fib = 0;
const ip6_address_t *ll_addr;
/* local0 interface doesn't support IP addressing */
if (sw_if_index == 0)
{
return
clib_error_create ("local0 interface doesn't support IP addressing");
}
if (ip6_address_is_link_local_unicast (address))
{
if (address_length != 128)
{
vnm->api_errno = VNET_API_ERROR_ADDRESS_LENGTH_MISMATCH;
return
clib_error_create
("prefix length of link-local address must be 128");
}
if (!is_del)
{
int rv;
rv = ip6_set_link_local_address (sw_if_index, address);
if (rv)
{
vnm->api_errno = rv;
return clib_error_create ("address not assignable");
}
}
else
{
ll_addr = ip6_get_link_local_address (sw_if_index);
if (ip6_address_is_equal (ll_addr, address))
{
vnm->api_errno = VNET_API_ERROR_ADDRESS_NOT_DELETABLE;
return clib_error_create ("address not deletable");
}
else
{
vnm->api_errno = VNET_API_ERROR_ADDRESS_NOT_FOUND_FOR_INTERFACE;
return clib_error_create ("address not found");
}
}
}
vec_validate (im->fib_index_by_sw_if_index, sw_if_index);
vec_validate (im->mfib_index_by_sw_if_index, sw_if_index);
ip6_addr_fib_init (&ip6_af, address,
vec_elt (im->fib_index_by_sw_if_index, sw_if_index));
vec_add1 (addr_fib, ip6_af);
/* *INDENT-OFF* */
if (!is_del)
{
/* When adding an address check that it does not conflict
with an existing address on any interface in this table. */
ip_interface_address_t *ia;
vnet_sw_interface_t *sif;
pool_foreach(sif, vnm->interface_main.sw_interfaces,
({
if (im->fib_index_by_sw_if_index[sw_if_index] ==
im->fib_index_by_sw_if_index[sif->sw_if_index])
{
foreach_ip_interface_address
(&im->lookup_main, ia, sif->sw_if_index,
0 /* honor unnumbered */ ,
({
ip6_address_t * x =
ip_interface_address_get_address
(&im->lookup_main, ia);
if (ip6_destination_matches_route
(im, address, x, ia->address_length) ||
ip6_destination_matches_route (im,
x,
address,
address_length))
{
/* an intf may have >1 addr from the same prefix */
if ((sw_if_index == sif->sw_if_index) &&
(ia->address_length == address_length) &&
!ip6_address_is_equal (x, address))
continue;
/* error if the length or intf was different */
vnm->api_errno = VNET_API_ERROR_DUPLICATE_IF_ADDRESS;
return
clib_error_create
("failed to add %U which conflicts with %U for interface %U",
format_ip6_address_and_length, address,
address_length,
format_ip6_address_and_length, x,
ia->address_length,
format_vnet_sw_if_index_name, vnm,
sif->sw_if_index);
}
}));
}
}));
}
/* *INDENT-ON* */
{
uword elts_before = pool_elts (lm->if_address_pool);
error = ip_interface_address_add_del
(lm, sw_if_index, addr_fib, address_length, is_del, &if_address_index);
if (error)
goto done;
/* Pool did not grow: add duplicate address. */
if (elts_before == pool_elts (lm->if_address_pool))
goto done;
}
ip6_sw_interface_enable_disable (sw_if_index, !is_del);
if (!is_del)
ip6_link_enable (sw_if_index);
/* intf addr routes are added/deleted on admin up/down */
if (vnet_sw_interface_is_admin_up (vnm, sw_if_index))
{
if (is_del)
ip6_del_interface_routes (sw_if_index,
im, ip6_af.fib_index, address,
address_length);
else
ip6_add_interface_routes (vnm, sw_if_index,
im, ip6_af.fib_index,
pool_elt_at_index (lm->if_address_pool,
if_address_index));
}
{
ip6_add_del_interface_address_callback_t *cb;
vec_foreach (cb, im->add_del_interface_address_callbacks)
cb->function (im, cb->function_opaque, sw_if_index,
address, address_length, if_address_index, is_del);
}
if (is_del)
ip6_link_disable (sw_if_index);
done:
vec_free (addr_fib);
return error;
}
#endif
static clib_error_t *
ip6_sw_interface_admin_up_down (vnet_main_t * vnm, u32 sw_if_index, u32 flags)
{
ip6_main_t *im = &ip6_main;
ip_interface_address_t *ia;
ip6_address_t *a;
u32 is_admin_up, fib_index;
/* Fill in lookup tables with default table (0). */
vec_validate (im->fib_index_by_sw_if_index, sw_if_index);
vec_validate_init_empty (im->
lookup_main.if_address_pool_index_by_sw_if_index,
sw_if_index, ~0);
is_admin_up = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP) != 0;
fib_index = vec_elt (im->fib_index_by_sw_if_index, sw_if_index);
/* *INDENT-OFF* */
foreach_ip_interface_address (&im->lookup_main, ia, sw_if_index,
0 /* honor unnumbered */,
({
a = ip_interface_address_get_address (&im->lookup_main, ia);
if (is_admin_up)
ip6_add_interface_routes (vnm, sw_if_index,
im, fib_index,
ia);
else
ip6_del_interface_routes (sw_if_index, im, fib_index,
a, ia->address_length);
}));
/* *INDENT-ON* */
return 0;
}
VNET_SW_INTERFACE_ADMIN_UP_DOWN_FUNCTION (ip6_sw_interface_admin_up_down);
/* Built-in ip6 unicast rx feature path definition */
/* *INDENT-OFF* */
VNET_FEATURE_ARC_INIT (ip6_unicast, static) =
{
.arc_name = "ip6-unicast",
.start_nodes = VNET_FEATURES ("ip6-input"),
.last_in_arc = "ip6-lookup",
.arc_index_ptr = &ip6_main.lookup_main.ucast_feature_arc_index,
};
VNET_FEATURE_INIT (ip6_flow_classify, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-flow-classify",
.runs_before = VNET_FEATURES ("ip6-inacl"),
};
VNET_FEATURE_INIT (ip6_inacl, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-inacl",
.runs_before = VNET_FEATURES ("ip6-policer-classify"),
};
VNET_FEATURE_INIT (ip6_policer_classify, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-policer-classify",
.runs_before = VNET_FEATURES ("ipsec6-input-feature"),
};
VNET_FEATURE_INIT (ip6_ipsec, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ipsec6-input-feature",
.runs_before = VNET_FEATURES ("l2tp-decap"),
};
VNET_FEATURE_INIT (ip6_l2tp, static) =
{
.arc_name = "ip6-unicast",
.node_name = "l2tp-decap",
.runs_before = VNET_FEATURES ("vpath-input-ip6"),
};
VNET_FEATURE_INIT (ip6_vpath, static) =
{
.arc_name = "ip6-unicast",
.node_name = "vpath-input-ip6",
.runs_before = VNET_FEATURES ("ip6-vxlan-bypass"),
};
VNET_FEATURE_INIT (ip6_vxlan_bypass, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-vxlan-bypass",
.runs_before = VNET_FEATURES ("ip6-lookup"),
};
VNET_FEATURE_INIT (ip6_not_enabled, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-not-enabled",
.runs_before = VNET_FEATURES ("ip6-lookup"),
};
VNET_FEATURE_INIT (ip6_lookup, static) =
{
.arc_name = "ip6-unicast",
.node_name = "ip6-lookup",
.runs_before = 0, /*last feature*/
};
/* Built-in ip6 multicast rx feature path definition (none now) */
VNET_FEATURE_ARC_INIT (ip6_multicast, static) =
{
.arc_name = "ip6-multicast",
.start_nodes = VNET_FEATURES ("ip6-input"),
.last_in_arc = "ip6-mfib-forward-lookup",
.arc_index_ptr = &ip6_main.lookup_main.mcast_feature_arc_index,
};
VNET_FEATURE_INIT (ip6_vpath_mc, static) = {
.arc_name = "ip6-multicast",
.node_name = "vpath-input-ip6",
.runs_before = VNET_FEATURES ("ip6-mfib-forward-lookup"),
};
VNET_FEATURE_INIT (ip6_not_enabled_mc, static) = {
.arc_name = "ip6-multicast",
.node_name = "ip6-not-enabled",
.runs_before = VNET_FEATURES ("ip6-mfib-forward-lookup"),
};
VNET_FEATURE_INIT (ip6_mc_lookup, static) = {
.arc_name = "ip6-multicast",
.node_name = "ip6-mfib-forward-lookup",
.runs_before = 0, /* last feature */
};
/* Built-in ip4 tx feature path definition */
VNET_FEATURE_ARC_INIT (ip6_output, static) =
{
.arc_name = "ip6-output",
.start_nodes = VNET_FEATURES ("ip6-rewrite", "ip6-midchain", "ip6-dvr-dpo"),
.last_in_arc = "interface-output",
.arc_index_ptr = &ip6_main.lookup_main.output_feature_arc_index,
};
VNET_FEATURE_INIT (ip6_outacl, static) = {
.arc_name = "ip6-output",
.node_name = "ip6-outacl",
.runs_before = VNET_FEATURES ("ipsec6-output-feature"),
};
VNET_FEATURE_INIT (ip6_ipsec_output, static) = {
.arc_name = "ip6-output",
.node_name = "ipsec6-output-feature",
.runs_before = VNET_FEATURES ("interface-output"),
};
VNET_FEATURE_INIT (ip6_interface_output, static) = {
.arc_name = "ip6-output",
.node_name = "interface-output",
.runs_before = 0, /* not before any other features */
};
/* *INDENT-ON* */
static clib_error_t *
ip6_sw_interface_add_del (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
{
ip6_main_t *im = &ip6_main;
vec_validate (im->fib_index_by_sw_if_index, sw_if_index);
vec_validate (im->mfib_index_by_sw_if_index, sw_if_index);
if (!is_add)
{
/* Ensure that IPv6 is disabled */
ip6_main_t *im6 = &ip6_main;
ip_lookup_main_t *lm6 = &im6->lookup_main;
ip_interface_address_t *ia = 0;
ip6_address_t *address;
vlib_main_t *vm = vlib_get_main ();
vnet_sw_interface_update_unnumbered (sw_if_index, ~0, 0);
/* *INDENT-OFF* */
foreach_ip_interface_address (lm6, ia, sw_if_index, 0,
({
address = ip_interface_address_get_address (lm6, ia);
ip6_add_del_interface_address(vm, sw_if_index, address, ia->address_length, 1);
}));
/* *INDENT-ON* */
ip6_mfib_interface_enable_disable (sw_if_index, 0);
}
vnet_feature_enable_disable ("ip6-unicast", "ip6-not-enabled", sw_if_index,
is_add, 0, 0);
vnet_feature_enable_disable ("ip6-multicast", "ip6-not-enabled",
sw_if_index, is_add, 0, 0);
return /* no error */ 0;
}
VNET_SW_INTERFACE_ADD_DEL_FUNCTION (ip6_sw_interface_add_del);
VLIB_NODE_FN (ip6_lookup_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
return ip6_lookup_inline (vm, node, frame);
}
static u8 *format_ip6_lookup_trace (u8 * s, va_list * args);
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_lookup_node) =
{
.name = "ip6-lookup",
.vector_size = sizeof (u32),
.format_trace = format_ip6_lookup_trace,
.n_next_nodes = IP6_LOOKUP_N_NEXT,
.next_nodes = IP6_LOOKUP_NEXT_NODES,
};
/* *INDENT-ON* */
VLIB_NODE_FN (ip6_load_balance_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
vlib_combined_counter_main_t *cm = &load_balance_main.lbm_via_counters;
u32 n_left, *from;
u32 thread_index = vm->thread_index;
ip6_main_t *im = &ip6_main;
vlib_buffer_t *bufs[VLIB_FRAME_SIZE], **b = bufs;
u16 nexts[VLIB_FRAME_SIZE], *next;
from = vlib_frame_vector_args (frame);
n_left = frame->n_vectors;
next = nexts;
vlib_get_buffers (vm, from, bufs, n_left);
while (n_left >= 4)
{
const load_balance_t *lb0, *lb1;
const ip6_header_t *ip0, *ip1;
u32 lbi0, hc0, lbi1, hc1;
const dpo_id_t *dpo0, *dpo1;
/* Prefetch next iteration. */
{
vlib_prefetch_buffer_header (b[2], STORE);
vlib_prefetch_buffer_header (b[3], STORE);
CLIB_PREFETCH (b[2]->data, sizeof (ip0[0]), STORE);
CLIB_PREFETCH (b[3]->data, sizeof (ip0[0]), STORE);
}
ip0 = vlib_buffer_get_current (b[0]);
ip1 = vlib_buffer_get_current (b[1]);
lbi0 = vnet_buffer (b[0])->ip.adj_index[VLIB_TX];
lbi1 = vnet_buffer (b[1])->ip.adj_index[VLIB_TX];
lb0 = load_balance_get (lbi0);
lb1 = load_balance_get (lbi1);
/*
* this node is for via FIBs we can re-use the hash value from the
* to node if present.
* We don't want to use the same hash value at each level in the recursion
* graph as that would lead to polarisation
*/
hc0 = hc1 = 0;
if (PREDICT_FALSE (lb0->lb_n_buckets > 1))
{
if (PREDICT_TRUE (vnet_buffer (b[0])->ip.flow_hash))
{
hc0 = vnet_buffer (b[0])->ip.flow_hash =
vnet_buffer (b[0])->ip.flow_hash >> 1;
}
else
{
hc0 = vnet_buffer (b[0])->ip.flow_hash =
ip6_compute_flow_hash (ip0, lb0->lb_hash_config);
}
dpo0 = load_balance_get_fwd_bucket
(lb0, (hc0 & (lb0->lb_n_buckets_minus_1)));
}
else
{
dpo0 = load_balance_get_bucket_i (lb0, 0);
}
if (PREDICT_FALSE (lb1->lb_n_buckets > 1))
{
if (PREDICT_TRUE (vnet_buffer (b[1])->ip.flow_hash))
{
hc1 = vnet_buffer (b[1])->ip.flow_hash =
vnet_buffer (b[1])->ip.flow_hash >> 1;
}
else
{
hc1 = vnet_buffer (b[1])->ip.flow_hash =
ip6_compute_flow_hash (ip1, lb1->lb_hash_config);
}
dpo1 = load_balance_get_fwd_bucket
(lb1, (hc1 & (lb1->lb_n_buckets_minus_1)));
}
else
{
dpo1 = load_balance_get_bucket_i (lb1, 0);
}
next[0] = dpo0->dpoi_next_node;
next[1] = dpo1->dpoi_next_node;
/* Only process the HBH Option Header if explicitly configured to do so */
if (PREDICT_FALSE (ip0->protocol == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS))
{
next[0] = (dpo_is_adj (dpo0) && im->hbh_enabled) ?
(ip_lookup_next_t) IP6_LOOKUP_NEXT_HOP_BY_HOP : next[0];
}
/* Only process the HBH Option Header if explicitly configured to do so */
if (PREDICT_FALSE (ip1->protocol == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS))
{
next[1] = (dpo_is_adj (dpo1) && im->hbh_enabled) ?
(ip_lookup_next_t) IP6_LOOKUP_NEXT_HOP_BY_HOP : next[1];
}
vnet_buffer (b[0])->ip.adj_index[VLIB_TX] = dpo0->dpoi_index;
vnet_buffer (b[1])->ip.adj_index[VLIB_TX] = dpo1->dpoi_index;
vlib_increment_combined_counter
(cm, thread_index, lbi0, 1, vlib_buffer_length_in_chain (vm, b[0]));
vlib_increment_combined_counter
(cm, thread_index, lbi1, 1, vlib_buffer_length_in_chain (vm, b[1]));
b += 2;
next += 2;
n_left -= 2;
}
while (n_left > 0)
{
const load_balance_t *lb0;
const ip6_header_t *ip0;
const dpo_id_t *dpo0;
u32 lbi0, hc0;
ip0 = vlib_buffer_get_current (b[0]);
lbi0 = vnet_buffer (b[0])->ip.adj_index[VLIB_TX];
lb0 = load_balance_get (lbi0);
hc0 = 0;
if (PREDICT_FALSE (lb0->lb_n_buckets > 1))
{
if (PREDICT_TRUE (vnet_buffer (b[0])->ip.flow_hash))
{
hc0 = vnet_buffer (b[0])->ip.flow_hash =
vnet_buffer (b[0])->ip.flow_hash >> 1;
}
else
{
hc0 = vnet_buffer (b[0])->ip.flow_hash =
ip6_compute_flow_hash (ip0, lb0->lb_hash_config);
}
dpo0 = load_balance_get_fwd_bucket
(lb0, (hc0 & (lb0->lb_n_buckets_minus_1)));
}
else
{
dpo0 = load_balance_get_bucket_i (lb0, 0);
}
next[0] = dpo0->dpoi_next_node;
vnet_buffer (b[0])->ip.adj_index[VLIB_TX] = dpo0->dpoi_index;
/* Only process the HBH Option Header if explicitly configured to do so */
if (PREDICT_FALSE (ip0->protocol == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS))
{
next[0] = (dpo_is_adj (dpo0) && im->hbh_enabled) ?
(ip_lookup_next_t) IP6_LOOKUP_NEXT_HOP_BY_HOP : next[0];
}
vlib_increment_combined_counter
(cm, thread_index, lbi0, 1, vlib_buffer_length_in_chain (vm, b[0]));
b += 1;
next += 1;
n_left -= 1;
}
vlib_buffer_enqueue_to_next (vm, node, from, nexts, frame->n_vectors);
if (node->flags & VLIB_NODE_FLAG_TRACE)
ip6_forward_next_trace (vm, node, frame, VLIB_TX);
return frame->n_vectors;
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_load_balance_node) =
{
.name = "ip6-load-balance",
.vector_size = sizeof (u32),
.sibling_of = "ip6-lookup",
.format_trace = format_ip6_lookup_trace,
};
/* *INDENT-ON* */
typedef struct
{
/* Adjacency taken. */
u32 adj_index;
u32 flow_hash;
u32 fib_index;
/* Packet data, possibly *after* rewrite. */
u8 packet_data[128 - 1 * sizeof (u32)];
}
ip6_forward_next_trace_t;
#ifndef CLIB_MARCH_VARIANT
u8 *
format_ip6_forward_next_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
ip6_forward_next_trace_t *t = va_arg (*args, ip6_forward_next_trace_t *);
u32 indent = format_get_indent (s);
s = format (s, "%U%U",
format_white_space, indent,
format_ip6_header, t->packet_data, sizeof (t->packet_data));
return s;
}
#endif
static u8 *
format_ip6_lookup_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
ip6_forward_next_trace_t *t = va_arg (*args, ip6_forward_next_trace_t *);
u32 indent = format_get_indent (s);
s = format (s, "fib %d dpo-idx %d flow hash: 0x%08x",
t->fib_index, t->adj_index, t->flow_hash);
s = format (s, "\n%U%U",
format_white_space, indent,
format_ip6_header, t->packet_data, sizeof (t->packet_data));
return s;
}
static u8 *
format_ip6_rewrite_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
ip6_forward_next_trace_t *t = va_arg (*args, ip6_forward_next_trace_t *);
u32 indent = format_get_indent (s);
s = format (s, "tx_sw_if_index %d adj-idx %d : %U flow hash: 0x%08x",
t->fib_index, t->adj_index, format_ip_adjacency,
t->adj_index, FORMAT_IP_ADJACENCY_NONE, t->flow_hash);
s = format (s, "\n%U%U",
format_white_space, indent,
format_ip_adjacency_packet_data,
t->packet_data, sizeof (t->packet_data));
return s;
}
/* Common trace function for all ip6-forward next nodes. */
#ifndef CLIB_MARCH_VARIANT
void
ip6_forward_next_trace (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame, vlib_rx_or_tx_t which_adj_index)
{
u32 *from, n_left;
ip6_main_t *im = &ip6_main;
n_left = frame->n_vectors;
from = vlib_frame_vector_args (frame);
while (n_left >= 4)
{
u32 bi0, bi1;
vlib_buffer_t *b0, *b1;
ip6_forward_next_trace_t *t0, *t1;
/* Prefetch next iteration. */
vlib_prefetch_buffer_with_index (vm, from[2], LOAD);
vlib_prefetch_buffer_with_index (vm, from[3], LOAD);
bi0 = from[0];
bi1 = from[1];
b0 = vlib_get_buffer (vm, bi0);
b1 = vlib_get_buffer (vm, bi1);
if (b0->flags & VLIB_BUFFER_IS_TRACED)
{
t0 = vlib_add_trace (vm, node, b0, sizeof (t0[0]));
t0->adj_index = vnet_buffer (b0)->ip.adj_index[which_adj_index];
t0->flow_hash = vnet_buffer (b0)->ip.flow_hash;
t0->fib_index =
(vnet_buffer (b0)->sw_if_index[VLIB_TX] !=
(u32) ~ 0) ? vnet_buffer (b0)->sw_if_index[VLIB_TX] :
vec_elt (im->fib_index_by_sw_if_index,
vnet_buffer (b0)->sw_if_index[VLIB_RX]);
clib_memcpy_fast (t0->packet_data,
vlib_buffer_get_current (b0),
sizeof (t0->packet_data));
}
if (b1->flags & VLIB_BUFFER_IS_TRACED)
{
t1 = vlib_add_trace (vm, node, b1, sizeof (t1[0]));
t1->adj_index = vnet_buffer (b1)->ip.adj_index[which_adj_index];
t1->flow_hash = vnet_buffer (b1)->ip.flow_hash;
t1->fib_index =
(vnet_buffer (b1)->sw_if_index[VLIB_TX] !=
(u32) ~ 0) ? vnet_buffer (b1)->sw_if_index[VLIB_TX] :
vec_elt (im->fib_index_by_sw_if_index,
vnet_buffer (b1)->sw_if_index[VLIB_RX]);
clib_memcpy_fast (t1->packet_data,
vlib_buffer_get_current (b1),
sizeof (t1->packet_data));
}
from += 2;
n_left -= 2;
}
while (n_left >= 1)
{
u32 bi0;
vlib_buffer_t *b0;
ip6_forward_next_trace_t *t0;
bi0 = from[0];
b0 = vlib_get_buffer (vm, bi0);
if (b0->flags & VLIB_BUFFER_IS_TRACED)
{
t0 = vlib_add_trace (vm, node, b0, sizeof (t0[0]));
t0->adj_index = vnet_buffer (b0)->ip.adj_index[which_adj_index];
t0->flow_hash = vnet_buffer (b0)->ip.flow_hash;
t0->fib_index =
(vnet_buffer (b0)->sw_if_index[VLIB_TX] !=
(u32) ~ 0) ? vnet_buffer (b0)->sw_if_index[VLIB_TX] :
vec_elt (im->fib_index_by_sw_if_index,
vnet_buffer (b0)->sw_if_index[VLIB_RX]);
clib_memcpy_fast (t0->packet_data,
vlib_buffer_get_current (b0),
sizeof (t0->packet_data));
}
from += 1;
n_left -= 1;
}
}
/* Compute TCP/UDP/ICMP6 checksum in software. */
u16
ip6_tcp_udp_icmp_compute_checksum (vlib_main_t * vm, vlib_buffer_t * p0,
ip6_header_t * ip0, int *bogus_lengthp)
{
ip_csum_t sum0 = 0;
u16 payload_length, payload_length_host_byte_order;
u32 i;
u32 headers_size = sizeof (ip0[0]);
u8 *data_this_buffer;
u8 next_hdr = ip0->protocol;
ASSERT (bogus_lengthp);
*bogus_lengthp = 0;
payload_length_host_byte_order = clib_net_to_host_u16 (ip0->payload_length);
data_this_buffer = (u8 *) (ip0 + 1);
payload_length = ip0->payload_length;
/* some icmp packets may come with a "router alert" hop-by-hop extension header (e.g., mldv2 packets)
* or UDP-Ping packets */
if (PREDICT_FALSE (next_hdr == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS))
{
u32 skip_bytes;
ip6_hop_by_hop_ext_t *ext_hdr =
(ip6_hop_by_hop_ext_t *) data_this_buffer;
/* validate really icmp6 next */
ASSERT ((ext_hdr->next_hdr == IP_PROTOCOL_ICMP6)
|| (ext_hdr->next_hdr == IP_PROTOCOL_UDP));
skip_bytes = 8 * (1 + ext_hdr->n_data_u64s);
data_this_buffer = (void *) ((u8 *) data_this_buffer + skip_bytes);
payload_length_host_byte_order -= skip_bytes;
headers_size += skip_bytes;
/* pseudo-header adjustments:
* exclude ext header bytes from payload length
* use payload IP proto rather than ext header IP proto
*/
payload_length = clib_host_to_net_u16 (payload_length_host_byte_order);
next_hdr = ext_hdr->next_hdr;
}
/* Initialize checksum with ip pseudo-header. */
sum0 = payload_length + clib_host_to_net_u16 (next_hdr);
for (i = 0; i < ARRAY_LEN (ip0->src_address.as_uword); i++)
{
sum0 = ip_csum_with_carry
(sum0, clib_mem_unaligned (&ip0->src_address.as_uword[i], uword));
sum0 = ip_csum_with_carry
(sum0, clib_mem_unaligned (&ip0->dst_address.as_uword[i], uword));
}
if (p0)
return ip_calculate_l4_checksum (vm, p0, sum0,
payload_length_host_byte_order,
(u8 *) ip0, headers_size, NULL);
else
return ip_calculate_l4_checksum (vm, 0, sum0,
payload_length_host_byte_order, NULL, 0,
data_this_buffer);
}
u32
ip6_tcp_udp_icmp_validate_checksum (vlib_main_t * vm, vlib_buffer_t * p0)
{
ip6_header_t *ip0 = vlib_buffer_get_current (p0);
udp_header_t *udp0;
u16 sum16;
int bogus_length;
/* some icmp packets may come with a "router alert" hop-by-hop extension header (e.g., mldv2 packets) */
ASSERT (ip0->protocol == IP_PROTOCOL_TCP
|| ip0->protocol == IP_PROTOCOL_ICMP6
|| ip0->protocol == IP_PROTOCOL_UDP
|| ip0->protocol == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS);
udp0 = (void *) (ip0 + 1);
if (ip0->protocol == IP_PROTOCOL_UDP && udp0->checksum == 0)
{
p0->flags |= (VNET_BUFFER_F_L4_CHECKSUM_COMPUTED
| VNET_BUFFER_F_L4_CHECKSUM_CORRECT);
return p0->flags;
}
sum16 = ip6_tcp_udp_icmp_compute_checksum (vm, p0, ip0, &bogus_length);
p0->flags |= (VNET_BUFFER_F_L4_CHECKSUM_COMPUTED
| ((sum16 == 0) << VNET_BUFFER_F_LOG2_L4_CHECKSUM_CORRECT));
return p0->flags;
}
#endif
/**
* @brief returns number of links on which src is reachable.
*/
always_inline int
ip6_urpf_loose_check (ip6_main_t * im, vlib_buffer_t * b, ip6_header_t * i)
{
const load_balance_t *lb0;
index_t lbi;
u32 fib_index;
fib_index = vec_elt (im->fib_index_by_sw_if_index,
vnet_buffer (b)->sw_if_index[VLIB_RX]);
fib_index =
(vnet_buffer (b)->sw_if_index[VLIB_TX] == (u32) ~ 0) ?
fib_index : vnet_buffer (b)->sw_if_index[VLIB_TX];
lbi = ip6_fib_table_fwding_lookup (fib_index, &i->src_address);
lb0 = load_balance_get (lbi);
return (fib_urpf_check_size (lb0->lb_urpf));
}
always_inline u8
ip6_next_proto_is_tcp_udp (vlib_buffer_t * p0, ip6_header_t * ip0,
u32 * udp_offset0)
{
u32 proto0;
proto0 = ip6_locate_header (p0, ip0, IP_PROTOCOL_UDP, udp_offset0);
if (proto0 != IP_PROTOCOL_UDP)
{
proto0 = ip6_locate_header (p0, ip0, IP_PROTOCOL_TCP, udp_offset0);
proto0 = (proto0 == IP_PROTOCOL_TCP) ? proto0 : 0;
}
return proto0;
}
/* *INDENT-OFF* */
VNET_FEATURE_ARC_INIT (ip6_local) =
{
.arc_name = "ip6-local",
.start_nodes = VNET_FEATURES ("ip6-local"),
};
/* *INDENT-ON* */
static_always_inline u8
ip6_tcp_udp_icmp_bad_length (vlib_main_t * vm, vlib_buffer_t * p0)
{
u16 payload_length_host_byte_order;
u32 n_this_buffer, n_bytes_left;
ip6_header_t *ip0 = vlib_buffer_get_current (p0);
u32 headers_size = sizeof (ip0[0]);
u8 *data_this_buffer;
data_this_buffer = (u8 *) (ip0 + 1);
ip6_hop_by_hop_ext_t *ext_hdr = (ip6_hop_by_hop_ext_t *) data_this_buffer;
/* validate really icmp6 next */
if (!(ext_hdr->next_hdr == IP_PROTOCOL_ICMP6)
|| (ext_hdr->next_hdr == IP_PROTOCOL_UDP))
return 0;
payload_length_host_byte_order = clib_net_to_host_u16 (ip0->payload_length);
n_bytes_left = n_this_buffer = payload_length_host_byte_order;
u32 n_ip_bytes_this_buffer =
p0->current_length - (((u8 *) ip0 - p0->data) - p0->current_data);
if (n_this_buffer + headers_size > n_ip_bytes_this_buffer)
{
n_this_buffer = p0->current_length > headers_size ?
n_ip_bytes_this_buffer - headers_size : 0;
}
n_bytes_left -= n_this_buffer;
n_bytes_left -= p0->total_length_not_including_first_buffer;
if (n_bytes_left == 0)
return 0;
else
return 1;
}
always_inline uword
ip6_local_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
vlib_frame_t * frame, int head_of_feature_arc)
{
ip6_main_t *im = &ip6_main;
ip_lookup_main_t *lm = &im->lookup_main;
u32 *from, n_left_from;
vlib_node_runtime_t *error_node =
vlib_node_get_runtime (vm, ip6_input_node.index);
u8 arc_index = vnet_feat_arc_ip6_local.feature_arc_index;
vlib_buffer_t *bufs[VLIB_FRAME_SIZE], **b;
u16 nexts[VLIB_FRAME_SIZE], *next;
from = vlib_frame_vector_args (frame);
n_left_from = frame->n_vectors;
if (node->flags & VLIB_NODE_FLAG_TRACE)
ip6_forward_next_trace (vm, node, frame, VLIB_TX);
vlib_get_buffers (vm, from, bufs, n_left_from);
b = bufs;
next = nexts;
while (n_left_from > 2)
{
/* Prefetch next iteration. */
if (n_left_from >= 6)
{
vlib_prefetch_buffer_header (b[4], STORE);
vlib_prefetch_buffer_header (b[5], STORE);
vlib_prefetch_buffer_data (b[2], LOAD);
vlib_prefetch_buffer_data (b[3], LOAD);
}
u8 error[2];
error[0] = IP6_ERROR_UNKNOWN_PROTOCOL;
error[1] = IP6_ERROR_UNKNOWN_PROTOCOL;
ip6_header_t *ip[2];
ip[0] = vlib_buffer_get_current (b[0]);
ip[1] = vlib_buffer_get_current (b[1]);
if (head_of_feature_arc)
{
vnet_buffer (b[0])->l3_hdr_offset = b[0]->current_data;
vnet_buffer (b[1])->l3_hdr_offset = b[1]->current_data;
u8 type[2];
type[0] = lm->builtin_protocol_by_ip_protocol[ip[0]->protocol];
type[1] = lm->builtin_protocol_by_ip_protocol[ip[1]->protocol];
u32 flags[2];
flags[0] = b[0]->flags;
flags[1] = b[1]->flags;
u32 good_l4_csum[2];
good_l4_csum[0] =
flags[0] & (VNET_BUFFER_F_L4_CHECKSUM_CORRECT |
VNET_BUFFER_F_OFFLOAD_TCP_CKSUM |
VNET_BUFFER_F_OFFLOAD_UDP_CKSUM);
good_l4_csum[1] =
flags[1] & (VNET_BUFFER_F_L4_CHECKSUM_CORRECT |
VNET_BUFFER_F_OFFLOAD_TCP_CKSUM |
VNET_BUFFER_F_OFFLOAD_UDP_CKSUM);
u32 udp_offset[2] = { };
u8 is_tcp_udp[2];
is_tcp_udp[0] =
ip6_next_proto_is_tcp_udp (b[0], ip[0], &udp_offset[0]);
is_tcp_udp[1] =
ip6_next_proto_is_tcp_udp (b[1], ip[1], &udp_offset[1]);
i16 len_diff[2] = { 0 };
if (PREDICT_TRUE (is_tcp_udp[0]))
{
udp_header_t *udp =
(udp_header_t *) ((u8 *) ip[0] + udp_offset[0]);
good_l4_csum[0] |= type[0] == IP_BUILTIN_PROTOCOL_UDP
&& udp->checksum == 0;
/* optimistically verify UDP length. */
u16 ip_len, udp_len;
ip_len = clib_net_to_host_u16 (ip[0]->payload_length);
udp_len = clib_net_to_host_u16 (udp->length);
len_diff[0] = ip_len - udp_len;
}
if (PREDICT_TRUE (is_tcp_udp[1]))
{
udp_header_t *udp =
(udp_header_t *) ((u8 *) ip[1] + udp_offset[1]);
good_l4_csum[1] |= type[1] == IP_BUILTIN_PROTOCOL_UDP
&& udp->checksum == 0;
/* optimistically verify UDP length. */
u16 ip_len, udp_len;
ip_len = clib_net_to_host_u16 (ip[1]->payload_length);
udp_len = clib_net_to_host_u16 (udp->length);
len_diff[1] = ip_len - udp_len;
}
good_l4_csum[0] |= type[0] == IP_BUILTIN_PROTOCOL_UNKNOWN;
good_l4_csum[1] |= type[1] == IP_BUILTIN_PROTOCOL_UNKNOWN;
len_diff[0] = type[0] == IP_BUILTIN_PROTOCOL_UDP ? len_diff[0] : 0;
len_diff[1] = type[1] == IP_BUILTIN_PROTOCOL_UDP ? len_diff[1] : 0;
u8 need_csum[2];
need_csum[0] = type[0] != IP_BUILTIN_PROTOCOL_UNKNOWN
&& !good_l4_csum[0]
&& !(flags[0] & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED);
need_csum[1] = type[1] != IP_BUILTIN_PROTOCOL_UNKNOWN
&& !good_l4_csum[1]
&& !(flags[1] & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED);
if (PREDICT_FALSE (need_csum[0]))
{
flags[0] = ip6_tcp_udp_icmp_validate_checksum (vm, b[0]);
good_l4_csum[0] = flags[0] & VNET_BUFFER_F_L4_CHECKSUM_CORRECT;
error[0] = IP6_ERROR_UNKNOWN_PROTOCOL;
}
else
{
if (ip6_tcp_udp_icmp_bad_length (vm, b[0]))
error[0] = IP6_ERROR_BAD_LENGTH;
}
if (PREDICT_FALSE (need_csum[1]))
{
flags[1] = ip6_tcp_udp_icmp_validate_checksum (vm, b[1]);
good_l4_csum[1] = flags[1] & VNET_BUFFER_F_L4_CHECKSUM_CORRECT;
error[1] = IP6_ERROR_UNKNOWN_PROTOCOL;
}
else
{
if (ip6_tcp_udp_icmp_bad_length (vm, b[1]))
error[1] = IP6_ERROR_BAD_LENGTH;
}
error[0] = len_diff[0] < 0 ? IP6_ERROR_UDP_LENGTH : error[0];
error[1] = len_diff[1] < 0 ? IP6_ERROR_UDP_LENGTH : error[1];
STATIC_ASSERT (IP6_ERROR_UDP_CHECKSUM + IP_BUILTIN_PROTOCOL_UDP ==
IP6_ERROR_UDP_CHECKSUM,
"Wrong IP6 errors constants");
STATIC_ASSERT (IP6_ERROR_UDP_CHECKSUM + IP_BUILTIN_PROTOCOL_ICMP ==
IP6_ERROR_ICMP_CHECKSUM,
"Wrong IP6 errors constants");
error[0] =
!good_l4_csum[0] ? IP6_ERROR_UDP_CHECKSUM + type[0] : error[0];
error[1] =
!good_l4_csum[1] ? IP6_ERROR_UDP_CHECKSUM + type[1] : error[1];
/* Drop packets from unroutable hosts. */
/* If this is a neighbor solicitation (ICMP), skip source RPF check */
u8 unroutable[2];
unroutable[0] = error[0] == IP6_ERROR_UNKNOWN_PROTOCOL
&& type[0] != IP_BUILTIN_PROTOCOL_ICMP
&& !ip6_address_is_link_local_unicast (&ip[0]->src_address);
unroutable[1] = error[1] == IP6_ERROR_UNKNOWN_PROTOCOL
&& type[1] != IP_BUILTIN_PROTOCOL_ICMP
&& !ip6_address_is_link_local_unicast (&ip[1]->src_address);
if (PREDICT_FALSE (unroutable[0]))
{
error[0] =
!ip6_urpf_loose_check (im, b[0],
ip[0]) ? IP6_ERROR_SRC_LOOKUP_MISS
: error[0];
}
if (PREDICT_FALSE (unroutable[1]))
{
error[1] =
!ip6_urpf_loose_check (im, b[1],
ip[1]) ? IP6_ERROR_SRC_LOOKUP_MISS
: error[1];
}
vnet_buffer (b[0])->ip.fib_index =
vnet_buffer (b[0])->sw_if_index[VLIB_TX] != ~0 ?
vnet_buffer (b[0])->sw_if_index[VLIB_TX] :
vnet_buffer (b[0])->ip.fib_index;
vnet_buffer (b[1])->ip.fib_index =
vnet_buffer (b[1])->sw_if_index[VLIB_TX] != ~0 ?
vnet_buffer (b[1])->sw_if_index[VLIB_TX] :
vnet_buffer (b[1])->ip.fib_index;
} /* head_of_feature_arc */
next[0] = lm->local_next_by_ip_protocol[ip[0]->protocol];
next[0] =
error[0] != IP6_ERROR_UNKNOWN_PROTOCOL ? IP_LOCAL_NEXT_DROP : next[0];
next[1] = lm->local_next_by_ip_protocol[ip[1]->protocol];
next[1] =
error[1] != IP6_ERROR_UNKNOWN_PROTOCOL ? IP_LOCAL_NEXT_DROP : next[1];
b[0]->error = error_node->errors[0];
b[1]->error = error_node->errors[1];
if (head_of_feature_arc)
{
u8 ip6_unknown[2];
ip6_unknown[0] = error[0] == (u8) IP6_ERROR_UNKNOWN_PROTOCOL;
ip6_unknown[1] = error[1] == (u8) IP6_ERROR_UNKNOWN_PROTOCOL;
if (PREDICT_TRUE (ip6_unknown[0]))
{
u32 next32 = next[0];
vnet_feature_arc_start (arc_index,
vnet_buffer (b[0])->sw_if_index
[VLIB_RX], &next32, b[0]);
next[0] = next32;
}
if (PREDICT_TRUE (ip6_unknown[1]))
{
u32 next32 = next[1];
vnet_feature_arc_start (arc_index,
vnet_buffer (b[1])->sw_if_index
[VLIB_RX], &next32, b[1]);
next[1] = next32;
}
}
/* next */
b += 2;
next += 2;
n_left_from -= 2;
}
while (n_left_from)
{
u8 error;
error = IP6_ERROR_UNKNOWN_PROTOCOL;
ip6_header_t *ip;
ip = vlib_buffer_get_current (b[0]);
if (head_of_feature_arc)
{
vnet_buffer (b[0])->l3_hdr_offset = b[0]->current_data;
u8 type = lm->builtin_protocol_by_ip_protocol[ip->protocol];
u32 flags = b[0]->flags;
u32 good_l4_csum =
flags & (VNET_BUFFER_F_L4_CHECKSUM_CORRECT |
VNET_BUFFER_F_OFFLOAD_TCP_CKSUM |
VNET_BUFFER_F_OFFLOAD_UDP_CKSUM);
u32 udp_offset;
i16 len_diff = 0;
u8 is_tcp_udp = ip6_next_proto_is_tcp_udp (b[0], ip, &udp_offset);
if (PREDICT_TRUE (is_tcp_udp))
{
udp_header_t *udp = (udp_header_t *) ((u8 *) ip + udp_offset);
/* Don't verify UDP checksum for packets with explicit zero checksum. */
good_l4_csum |= type == IP_BUILTIN_PROTOCOL_UDP
&& udp->checksum == 0;
/* optimistically verify UDP length. */
u16 ip_len, udp_len;
ip_len = clib_net_to_host_u16 (ip->payload_length);
udp_len = clib_net_to_host_u16 (udp->length);
len_diff = ip_len - udp_len;
}
good_l4_csum |= type == IP_BUILTIN_PROTOCOL_UNKNOWN;
len_diff = type == IP_BUILTIN_PROTOCOL_UDP ? len_diff : 0;
u8 need_csum = type != IP_BUILTIN_PROTOCOL_UNKNOWN && !good_l4_csum
&& !(flags & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED);
if (PREDICT_FALSE (need_csum))
{
flags = ip6_tcp_udp_icmp_validate_checksum (vm, b[0]);
good_l4_csum = flags & VNET_BUFFER_F_L4_CHECKSUM_CORRECT;
error = IP6_ERROR_UNKNOWN_PROTOCOL;
}
else
{
if (ip6_tcp_udp_icmp_bad_length (vm, b[0]))
error = IP6_ERROR_BAD_LENGTH;
}
error = len_diff < 0 ? IP6_ERROR_UDP_LENGTH : error;
STATIC_ASSERT (IP6_ERROR_UDP_CHECKSUM + IP_BUILTIN_PROTOCOL_UDP ==
IP6_ERROR_UDP_CHECKSUM,
"Wrong IP6 errors constants");
STATIC_ASSERT (IP6_ERROR_UDP_CHECKSUM + IP_BUILTIN_PROTOCOL_ICMP ==
IP6_ERROR_ICMP_CHECKSUM,
"Wrong IP6 errors constants");
error = !good_l4_csum ? IP6_ERROR_UDP_CHECKSUM + type : error;
/* Drop packets from unroutable hosts. */
/* If this is a neighbor solicitation (ICMP), skip source RPF check */
u8 unroutable = error == IP6_ERROR_UNKNOWN_PROTOCOL
&& type != IP_BUILTIN_PROTOCOL_ICMP
&& !ip6_address_is_link_local_unicast (&ip->src_address);
if (PREDICT_FALSE (unroutable))
{
error =
!ip6_urpf_loose_check (im, b[0],
ip) ? IP6_ERROR_SRC_LOOKUP_MISS :
error;
}
vnet_buffer (b[0])->ip.fib_index =
vnet_buffer (b[0])->sw_if_index[VLIB_TX] != ~0 ?
vnet_buffer (b[0])->sw_if_index[VLIB_TX] :
vnet_buffer (b[0])->ip.fib_index;
} /* head_of_feature_arc */
next[0] = lm->local_next_by_ip_protocol[ip->protocol];
next[0] =
error != IP6_ERROR_UNKNOWN_PROTOCOL ? IP_LOCAL_NEXT_DROP : next[0];
b[0]->error = error_node->errors[0];
if (head_of_feature_arc)
{
if (PREDICT_TRUE (error == (u8) IP6_ERROR_UNKNOWN_PROTOCOL))
{
u32 next32 = next[0];
vnet_feature_arc_start (arc_index,
vnet_buffer (b[0])->sw_if_index
[VLIB_RX], &next32, b[0]);
next[0] = next32;
}
}
/* next */
b += 1;
next += 1;
n_left_from -= 1;
}
vlib_buffer_enqueue_to_next (vm, node, from, nexts, frame->n_vectors);
return frame->n_vectors;
}
VLIB_NODE_FN (ip6_local_node) (vlib_main_t * vm, vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
return ip6_local_inline (vm, node, frame, 1 /* head of feature arc */ );
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_local_node) =
{
.name = "ip6-local",
.vector_size = sizeof (u32),
.format_trace = format_ip6_forward_next_trace,
.n_next_nodes = IP_LOCAL_N_NEXT,
.next_nodes =
{
[IP_LOCAL_NEXT_DROP] = "ip6-drop",
[IP_LOCAL_NEXT_PUNT] = "ip6-punt",
[IP_LOCAL_NEXT_UDP_LOOKUP] = "ip6-udp-lookup",
[IP_LOCAL_NEXT_ICMP] = "ip6-icmp-input",
[IP_LOCAL_NEXT_REASSEMBLY] = "ip6-full-reassembly",
},
};
/* *INDENT-ON* */
VLIB_NODE_FN (ip6_local_end_of_arc_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
return ip6_local_inline (vm, node, frame, 0 /* head of feature arc */ );
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_local_end_of_arc_node) = {
.name = "ip6-local-end-of-arc",
.vector_size = sizeof (u32),
.format_trace = format_ip6_forward_next_trace,
.sibling_of = "ip6-local",
};
VNET_FEATURE_INIT (ip6_local_end_of_arc, static) = {
.arc_name = "ip6-local",
.node_name = "ip6-local-end-of-arc",
.runs_before = 0, /* not before any other features */
};
/* *INDENT-ON* */
#ifdef CLIB_MARCH_VARIANT
extern vlib_node_registration_t ip6_local_node;
#else
void
ip6_register_protocol (u32 protocol, u32 node_index)
{
vlib_main_t *vm = vlib_get_main ();
ip6_main_t *im = &ip6_main;
ip_lookup_main_t *lm = &im->lookup_main;
ASSERT (protocol < ARRAY_LEN (lm->local_next_by_ip_protocol));
lm->local_next_by_ip_protocol[protocol] =
vlib_node_add_next (vm, ip6_local_node.index, node_index);
}
void
ip6_unregister_protocol (u32 protocol)
{
ip6_main_t *im = &ip6_main;
ip_lookup_main_t *lm = &im->lookup_main;
ASSERT (protocol < ARRAY_LEN (lm->local_next_by_ip_protocol));
lm->local_next_by_ip_protocol[protocol] = IP_LOCAL_NEXT_PUNT;
}
#endif
typedef enum
{
IP6_REWRITE_NEXT_DROP,
IP6_REWRITE_NEXT_ICMP_ERROR,
IP6_REWRITE_NEXT_FRAGMENT,
IP6_REWRITE_N_NEXT /* Last */
} ip6_rewrite_next_t;
/**
* This bits of an IPv6 address to mask to construct a multicast
* MAC address
*/
#define IP6_MCAST_ADDR_MASK 0xffffffff
always_inline void
ip6_mtu_check (vlib_buffer_t * b, u16 packet_bytes,
u16 adj_packet_bytes, bool is_locally_generated,
u32 * next, u8 is_midchain, u32 * error)
{
if (adj_packet_bytes >= 1280 && packet_bytes > adj_packet_bytes)
{
if (is_locally_generated)
{
/* IP fragmentation */
ip_frag_set_vnet_buffer (b, adj_packet_bytes,
(is_midchain ?
IP_FRAG_NEXT_IP_REWRITE_MIDCHAIN :
IP_FRAG_NEXT_IP_REWRITE), 0);
*next = IP6_REWRITE_NEXT_FRAGMENT;
*error = IP6_ERROR_MTU_EXCEEDED;
}
else
{
*error = IP6_ERROR_MTU_EXCEEDED;
icmp6_error_set_vnet_buffer (b, ICMP6_packet_too_big, 0,
adj_packet_bytes);
*next = IP6_REWRITE_NEXT_ICMP_ERROR;
}
}
}
always_inline uword
ip6_rewrite_inline_with_gso (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame,
int do_counters, int is_midchain, int is_mcast)
{
ip_lookup_main_t *lm = &ip6_main.lookup_main;
u32 *from = vlib_frame_vector_args (frame);
u32 n_left_from, n_left_to_next, *to_next, next_index;
vlib_node_runtime_t *error_node =
vlib_node_get_runtime (vm, ip6_input_node.index);
n_left_from = frame->n_vectors;
next_index = node->cached_next_index;
u32 thread_index = vm->thread_index;
while (n_left_from > 0)
{
vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
while (n_left_from >= 4 && n_left_to_next >= 2)
{
const ip_adjacency_t *adj0, *adj1;
vlib_buffer_t *p0, *p1;
ip6_header_t *ip0, *ip1;
u32 pi0, rw_len0, next0, error0, adj_index0;
u32 pi1, rw_len1, next1, error1, adj_index1;
u32 tx_sw_if_index0, tx_sw_if_index1;
bool is_locally_originated0, is_locally_originated1;
/* Prefetch next iteration. */
{
vlib_buffer_t *p2, *p3;
p2 = vlib_get_buffer (vm, from[2]);
p3 = vlib_get_buffer (vm, from[3]);
vlib_prefetch_buffer_header (p2, LOAD);
vlib_prefetch_buffer_header (p3, LOAD);
CLIB_PREFETCH (p2->pre_data, 32, STORE);
CLIB_PREFETCH (p3->pre_data, 32, STORE);
CLIB_PREFETCH (p2->data, sizeof (ip0[0]), STORE);
CLIB_PREFETCH (p3->data, sizeof (ip0[0]), STORE);
}
pi0 = to_next[0] = from[0];
pi1 = to_next[1] = from[1];
from += 2;
n_left_from -= 2;
to_next += 2;
n_left_to_next -= 2;
p0 = vlib_get_buffer (vm, pi0);
p1 = vlib_get_buffer (vm, pi1);
adj_index0 = vnet_buffer (p0)->ip.adj_index[VLIB_TX];
adj_index1 = vnet_buffer (p1)->ip.adj_index[VLIB_TX];
ip0 = vlib_buffer_get_current (p0);
ip1 = vlib_buffer_get_current (p1);
error0 = error1 = IP6_ERROR_NONE;
next0 = next1 = IP6_REWRITE_NEXT_DROP;
is_locally_originated0 =
p0->flags & VNET_BUFFER_F_LOCALLY_ORIGINATED;
if (PREDICT_TRUE (!is_locally_originated0))
{
i32 hop_limit0 = ip0->hop_limit;
/* Input node should have reject packets with hop limit 0. */
ASSERT (ip0->hop_limit > 0);
hop_limit0 -= 1;
ip0->hop_limit = hop_limit0;
/*
* If the hop count drops below 1 when forwarding, generate
* an ICMP response.
*/
if (PREDICT_FALSE (hop_limit0 <= 0))
{
error0 = IP6_ERROR_TIME_EXPIRED;
next0 = IP6_REWRITE_NEXT_ICMP_ERROR;
vnet_buffer (p0)->sw_if_index[VLIB_TX] = (u32) ~ 0;
icmp6_error_set_vnet_buffer (p0, ICMP6_time_exceeded,
ICMP6_time_exceeded_ttl_exceeded_in_transit,
0);
}
}
is_locally_originated1 =
p1->flags & VNET_BUFFER_F_LOCALLY_ORIGINATED;
if (PREDICT_TRUE (!is_locally_originated1))
{
i32 hop_limit1 = ip1->hop_limit;
/* Input node should have reject packets with hop limit 0. */
ASSERT (ip1->hop_limit > 0);
hop_limit1 -= 1;
ip1->hop_limit = hop_limit1;
/*
* If the hop count drops below 1 when forwarding, generate
* an ICMP response.
*/
if (PREDICT_FALSE (hop_limit1 <= 0))
{
error1 = IP6_ERROR_TIME_EXPIRED;
next1 = IP6_REWRITE_NEXT_ICMP_ERROR;
vnet_buffer (p1)->sw_if_index[VLIB_TX] = (u32) ~ 0;
icmp6_error_set_vnet_buffer (p1, ICMP6_time_exceeded,
ICMP6_time_exceeded_ttl_exceeded_in_transit,
0);
}
}
adj0 = adj_get (adj_index0);
adj1 = adj_get (adj_index1);
rw_len0 = adj0[0].rewrite_header.data_bytes;
rw_len1 = adj1[0].rewrite_header.data_bytes;
vnet_buffer (p0)->ip.save_rewrite_length = rw_len0;
vnet_buffer (p1)->ip.save_rewrite_length = rw_len1;
if (do_counters)
{
vlib_increment_combined_counter
(&adjacency_counters,
thread_index, adj_index0, 1,
vlib_buffer_length_in_chain (vm, p0) + rw_len0);
vlib_increment_combined_counter
(&adjacency_counters,
thread_index, adj_index1, 1,
vlib_buffer_length_in_chain (vm, p1) + rw_len1);
}
/* Check MTU of outgoing interface. */
u16 ip0_len =
clib_net_to_host_u16 (ip0->payload_length) +
sizeof (ip6_header_t);
u16 ip1_len =
clib_net_to_host_u16 (ip1->payload_length) +
sizeof (ip6_header_t);
if (p0->flags & VNET_BUFFER_F_GSO)
ip0_len = gso_mtu_sz (p0);
if (p1->flags & VNET_BUFFER_F_GSO)
ip1_len = gso_mtu_sz (p1);
ip6_mtu_check (p0, ip0_len,
adj0[0].rewrite_header.max_l3_packet_bytes,
is_locally_originated0, &next0, is_midchain,
&error0);
ip6_mtu_check (p1, ip1_len,
adj1[0].rewrite_header.max_l3_packet_bytes,
is_locally_originated1, &next1, is_midchain,
&error1);
/* Don't adjust the buffer for hop count issue; icmp-error node
* wants to see the IP header */
if (PREDICT_TRUE (error0 == IP6_ERROR_NONE))
{
p0->current_data -= rw_len0;
p0->current_length += rw_len0;
tx_sw_if_index0 = adj0[0].rewrite_header.sw_if_index;
vnet_buffer (p0)->sw_if_index[VLIB_TX] = tx_sw_if_index0;
next0 = adj0[0].rewrite_header.next_index;
if (PREDICT_FALSE
(adj0[0].rewrite_header.flags & VNET_REWRITE_HAS_FEATURES))
vnet_feature_arc_start (lm->output_feature_arc_index,
tx_sw_if_index0, &next0, p0);
}
else
{
p0->error = error_node->errors[error0];
}
if (PREDICT_TRUE (error1 == IP6_ERROR_NONE))
{
p1->current_data -= rw_len1;
p1->current_length += rw_len1;
tx_sw_if_index1 = adj1[0].rewrite_header.sw_if_index;
vnet_buffer (p1)->sw_if_index[VLIB_TX] = tx_sw_if_index1;
next1 = adj1[0].rewrite_header.next_index;
if (PREDICT_FALSE
(adj1[0].rewrite_header.flags & VNET_REWRITE_HAS_FEATURES))
vnet_feature_arc_start (lm->output_feature_arc_index,
tx_sw_if_index1, &next1, p1);
}
else
{
p1->error = error_node->errors[error1];
}
if (is_midchain)
{
/* before we paint on the next header, update the L4
* checksums if required, since there's no offload on a tunnel */
calc_checksums (vm, p0);
calc_checksums (vm, p1);
}
/* Guess we are only writing on simple Ethernet header. */
vnet_rewrite_two_headers (adj0[0], adj1[0],
ip0, ip1, sizeof (ethernet_header_t));
if (is_midchain)
{
if (adj0->sub_type.midchain.fixup_func)
adj0->sub_type.midchain.fixup_func
(vm, adj0, p0, adj0->sub_type.midchain.fixup_data);
if (adj1->sub_type.midchain.fixup_func)
adj1->sub_type.midchain.fixup_func
(vm, adj1, p1, adj1->sub_type.midchain.fixup_data);
}
if (is_mcast)
{
/*
* copy bytes from the IP address into the MAC rewrite
*/
vnet_ip_mcast_fixup_header (IP6_MCAST_ADDR_MASK,
adj0->
rewrite_header.dst_mcast_offset,
&ip0->dst_address.as_u32[3],
(u8 *) ip0);
vnet_ip_mcast_fixup_header (IP6_MCAST_ADDR_MASK,
adj1->
rewrite_header.dst_mcast_offset,
&ip1->dst_address.as_u32[3],
(u8 *) ip1);
}
vlib_validate_buffer_enqueue_x2 (vm, node, next_index,
to_next, n_left_to_next,
pi0, pi1, next0, next1);
}
while (n_left_from > 0 && n_left_to_next > 0)
{
ip_adjacency_t *adj0;
vlib_buffer_t *p0;
ip6_header_t *ip0;
u32 pi0, rw_len0;
u32 adj_index0, next0, error0;
u32 tx_sw_if_index0;
bool is_locally_originated0;
pi0 = to_next[0] = from[0];
p0 = vlib_get_buffer (vm, pi0);
adj_index0 = vnet_buffer (p0)->ip.adj_index[VLIB_TX];
adj0 = adj_get (adj_index0);
ip0 = vlib_buffer_get_current (p0);
error0 = IP6_ERROR_NONE;
next0 = IP6_REWRITE_NEXT_DROP;
/* Check hop limit */
is_locally_originated0 =
p0->flags & VNET_BUFFER_F_LOCALLY_ORIGINATED;
if (PREDICT_TRUE (!is_locally_originated0))
{
i32 hop_limit0 = ip0->hop_limit;
ASSERT (ip0->hop_limit > 0);
hop_limit0 -= 1;
ip0->hop_limit = hop_limit0;
if (PREDICT_FALSE (hop_limit0 <= 0))
{
/*
* If the hop count drops below 1 when forwarding, generate
* an ICMP response.
*/
error0 = IP6_ERROR_TIME_EXPIRED;
next0 = IP6_REWRITE_NEXT_ICMP_ERROR;
vnet_buffer (p0)->sw_if_index[VLIB_TX] = (u32) ~ 0;
icmp6_error_set_vnet_buffer (p0, ICMP6_time_exceeded,
ICMP6_time_exceeded_ttl_exceeded_in_transit,
0);
}
}
else
{
p0->flags &= ~VNET_BUFFER_F_LOCALLY_ORIGINATED;
}
if (is_midchain)
{
calc_checksums (vm, p0);
}
/* Guess we are only writing on simple Ethernet header. */
vnet_rewrite_one_header (adj0[0], ip0, sizeof (ethernet_header_t));
/* Update packet buffer attributes/set output interface. */
rw_len0 = adj0[0].rewrite_header.data_bytes;
vnet_buffer (p0)->ip.save_rewrite_length = rw_len0;
if (do_counters)
{
vlib_increment_combined_counter
(&adjacency_counters,
thread_index, adj_index0, 1,
vlib_buffer_length_in_chain (vm, p0) + rw_len0);
}
/* Check MTU of outgoing interface. */
u16 ip0_len =
clib_net_to_host_u16 (ip0->payload_length) +
sizeof (ip6_header_t);
if (p0->flags & VNET_BUFFER_F_GSO)
ip0_len = gso_mtu_sz (p0);
ip6_mtu_check (p0, ip0_len,
adj0[0].rewrite_header.max_l3_packet_bytes,
is_locally_originated0, &next0, is_midchain,
&error0);
/* Don't adjust the buffer for hop count issue; icmp-error node
* wants to see the IP header */
if (PREDICT_TRUE (error0 == IP6_ERROR_NONE))
{
p0->current_data -= rw_len0;
p0->current_length += rw_len0;
tx_sw_if_index0 = adj0[0].rewrite_header.sw_if_index;
vnet_buffer (p0)->sw_if_index[VLIB_TX] = tx_sw_if_index0;
next0 = adj0[0].rewrite_header.next_index;
if (PREDICT_FALSE
(adj0[0].rewrite_header.flags & VNET_REWRITE_HAS_FEATURES))
vnet_feature_arc_start (lm->output_feature_arc_index,
tx_sw_if_index0, &next0, p0);
}
else
{
p0->error = error_node->errors[error0];
}
if (is_midchain)
{
if (adj0->sub_type.midchain.fixup_func)
adj0->sub_type.midchain.fixup_func
(vm, adj0, p0, adj0->sub_type.midchain.fixup_data);
}
if (is_mcast)
{
vnet_ip_mcast_fixup_header (IP6_MCAST_ADDR_MASK,
adj0->
rewrite_header.dst_mcast_offset,
&ip0->dst_address.as_u32[3],
(u8 *) ip0);
}
from += 1;
n_left_from -= 1;
to_next += 1;
n_left_to_next -= 1;
vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
to_next, n_left_to_next,
pi0, next0);
}
vlib_put_next_frame (vm, node, next_index, n_left_to_next);
}
/* Need to do trace after rewrites to pick up new packet data. */
if (node->flags & VLIB_NODE_FLAG_TRACE)
ip6_forward_next_trace (vm, node, frame, VLIB_TX);
return frame->n_vectors;
}
always_inline uword
ip6_rewrite_inline (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame,
int do_counters, int is_midchain, int is_mcast)
{
return ip6_rewrite_inline_with_gso (vm, node, frame, do_counters,
is_midchain, is_mcast);
}
VLIB_NODE_FN (ip6_rewrite_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
if (adj_are_counters_enabled ())
return ip6_rewrite_inline (vm, node, frame, 1, 0, 0);
else
return ip6_rewrite_inline (vm, node, frame, 0, 0, 0);
}
VLIB_NODE_FN (ip6_rewrite_bcast_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
if (adj_are_counters_enabled ())
return ip6_rewrite_inline (vm, node, frame, 1, 0, 0);
else
return ip6_rewrite_inline (vm, node, frame, 0, 0, 0);
}
VLIB_NODE_FN (ip6_rewrite_mcast_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
if (adj_are_counters_enabled ())
return ip6_rewrite_inline (vm, node, frame, 1, 0, 1);
else
return ip6_rewrite_inline (vm, node, frame, 0, 0, 1);
}
VLIB_NODE_FN (ip6_midchain_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
if (adj_are_counters_enabled ())
return ip6_rewrite_inline (vm, node, frame, 1, 1, 0);
else
return ip6_rewrite_inline (vm, node, frame, 0, 1, 0);
}
VLIB_NODE_FN (ip6_mcast_midchain_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
if (adj_are_counters_enabled ())
return ip6_rewrite_inline (vm, node, frame, 1, 1, 1);
else
return ip6_rewrite_inline (vm, node, frame, 0, 1, 1);
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_midchain_node) =
{
.name = "ip6-midchain",
.vector_size = sizeof (u32),
.format_trace = format_ip6_forward_next_trace,
.sibling_of = "ip6-rewrite",
};
VLIB_REGISTER_NODE (ip6_rewrite_node) =
{
.name = "ip6-rewrite",
.vector_size = sizeof (u32),
.format_trace = format_ip6_rewrite_trace,
.n_next_nodes = IP6_REWRITE_N_NEXT,
.next_nodes =
{
[IP6_REWRITE_NEXT_DROP] = "ip6-drop",
[IP6_REWRITE_NEXT_ICMP_ERROR] = "ip6-icmp-error",
[IP6_REWRITE_NEXT_FRAGMENT] = "ip6-frag",
},
};
VLIB_REGISTER_NODE (ip6_rewrite_bcast_node) = {
.name = "ip6-rewrite-bcast",
.vector_size = sizeof (u32),
.format_trace = format_ip6_rewrite_trace,
.sibling_of = "ip6-rewrite",
};
VLIB_REGISTER_NODE (ip6_rewrite_mcast_node) =
{
.name = "ip6-rewrite-mcast",
.vector_size = sizeof (u32),
.format_trace = format_ip6_rewrite_trace,
.sibling_of = "ip6-rewrite",
};
VLIB_REGISTER_NODE (ip6_mcast_midchain_node) =
{
.name = "ip6-mcast-midchain",
.vector_size = sizeof (u32),
.format_trace = format_ip6_rewrite_trace,
.sibling_of = "ip6-rewrite",
};
/* *INDENT-ON* */
/*
* Hop-by-Hop handling
*/
#ifndef CLIB_MARCH_VARIANT
ip6_hop_by_hop_main_t ip6_hop_by_hop_main;
#endif /* CLIB_MARCH_VARIANT */
#define foreach_ip6_hop_by_hop_error \
_(PROCESSED, "pkts with ip6 hop-by-hop options") \
_(FORMAT, "incorrectly formatted hop-by-hop options") \
_(UNKNOWN_OPTION, "unknown ip6 hop-by-hop options")
/* *INDENT-OFF* */
typedef enum
{
#define _(sym,str) IP6_HOP_BY_HOP_ERROR_##sym,
foreach_ip6_hop_by_hop_error
#undef _
IP6_HOP_BY_HOP_N_ERROR,
} ip6_hop_by_hop_error_t;
/* *INDENT-ON* */
/*
* Primary h-b-h handler trace support
* We work pretty hard on the problem for obvious reasons
*/
typedef struct
{
u32 next_index;
u32 trace_len;
u8 option_data[256];
} ip6_hop_by_hop_trace_t;
extern vlib_node_registration_t ip6_hop_by_hop_node;
static char *ip6_hop_by_hop_error_strings[] = {
#define _(sym,string) string,
foreach_ip6_hop_by_hop_error
#undef _
};
#ifndef CLIB_MARCH_VARIANT
u8 *
format_ip6_hop_by_hop_ext_hdr (u8 * s, va_list * args)
{
ip6_hop_by_hop_header_t *hbh0 = va_arg (*args, ip6_hop_by_hop_header_t *);
int total_len = va_arg (*args, int);
ip6_hop_by_hop_option_t *opt0, *limit0;
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
u8 type0;
s = format (s, "IP6_HOP_BY_HOP: next protocol %d len %d total %d",
hbh0->protocol, (hbh0->length + 1) << 3, total_len);
opt0 = (ip6_hop_by_hop_option_t *) (hbh0 + 1);
limit0 = (ip6_hop_by_hop_option_t *) ((u8 *) hbh0 + total_len);
while (opt0 < limit0)
{
type0 = opt0->type;
switch (type0)
{
case 0: /* Pad, just stop */
opt0 = (ip6_hop_by_hop_option_t *) ((u8 *) opt0 + 1);
break;
default:
if (hm->trace[type0])
{
s = (*hm->trace[type0]) (s, opt0);
}
else
{
s =
format (s, "\n unrecognized option %d length %d", type0,
opt0->length);
}
opt0 =
(ip6_hop_by_hop_option_t *) (((u8 *) opt0) + opt0->length +
sizeof (ip6_hop_by_hop_option_t));
break;
}
}
return s;
}
#endif
static u8 *
format_ip6_hop_by_hop_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
ip6_hop_by_hop_trace_t *t = va_arg (*args, ip6_hop_by_hop_trace_t *);
ip6_hop_by_hop_header_t *hbh0;
ip6_hop_by_hop_option_t *opt0, *limit0;
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
u8 type0;
hbh0 = (ip6_hop_by_hop_header_t *) t->option_data;
s = format (s, "IP6_HOP_BY_HOP: next index %d len %d traced %d",
t->next_index, (hbh0->length + 1) << 3, t->trace_len);
opt0 = (ip6_hop_by_hop_option_t *) (hbh0 + 1);
limit0 = (ip6_hop_by_hop_option_t *) ((u8 *) hbh0) + t->trace_len;
while (opt0 < limit0)
{
type0 = opt0->type;
switch (type0)
{
case 0: /* Pad, just stop */
opt0 = (ip6_hop_by_hop_option_t *) ((u8 *) opt0) + 1;
break;
default:
if (hm->trace[type0])
{
s = (*hm->trace[type0]) (s, opt0);
}
else
{
s =
format (s, "\n unrecognized option %d length %d", type0,
opt0->length);
}
opt0 =
(ip6_hop_by_hop_option_t *) (((u8 *) opt0) + opt0->length +
sizeof (ip6_hop_by_hop_option_t));
break;
}
}
return s;
}
always_inline u8
ip6_scan_hbh_options (vlib_buffer_t * b0,
ip6_header_t * ip0,
ip6_hop_by_hop_header_t * hbh0,
ip6_hop_by_hop_option_t * opt0,
ip6_hop_by_hop_option_t * limit0, u32 * next0)
{
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
u8 type0;
u8 error0 = 0;
while (opt0 < limit0)
{
type0 = opt0->type;
switch (type0)
{
case 0: /* Pad1 */
opt0 = (ip6_hop_by_hop_option_t *) ((u8 *) opt0) + 1;
continue;
case 1: /* PadN */
break;
default:
if (hm->options[type0])
{
if ((*hm->options[type0]) (b0, ip0, opt0) < 0)
{
error0 = IP6_HOP_BY_HOP_ERROR_FORMAT;
return (error0);
}
}
else
{
/* Unrecognized mandatory option, check the two high order bits */
switch (opt0->type & HBH_OPTION_TYPE_HIGH_ORDER_BITS)
{
case HBH_OPTION_TYPE_SKIP_UNKNOWN:
break;
case HBH_OPTION_TYPE_DISCARD_UNKNOWN:
error0 = IP6_HOP_BY_HOP_ERROR_UNKNOWN_OPTION;
*next0 = IP_LOOKUP_NEXT_DROP;
break;
case HBH_OPTION_TYPE_DISCARD_UNKNOWN_ICMP:
error0 = IP6_HOP_BY_HOP_ERROR_UNKNOWN_OPTION;
*next0 = IP_LOOKUP_NEXT_ICMP_ERROR;
icmp6_error_set_vnet_buffer (b0, ICMP6_parameter_problem,
ICMP6_parameter_problem_unrecognized_option,
(u8 *) opt0 - (u8 *) ip0);
break;
case HBH_OPTION_TYPE_DISCARD_UNKNOWN_ICMP_NOT_MCAST:
error0 = IP6_HOP_BY_HOP_ERROR_UNKNOWN_OPTION;
if (!ip6_address_is_multicast (&ip0->dst_address))
{
*next0 = IP_LOOKUP_NEXT_ICMP_ERROR;
icmp6_error_set_vnet_buffer (b0,
ICMP6_parameter_problem,
ICMP6_parameter_problem_unrecognized_option,
(u8 *) opt0 - (u8 *) ip0);
}
else
{
*next0 = IP_LOOKUP_NEXT_DROP;
}
break;
}
return (error0);
}
}
opt0 =
(ip6_hop_by_hop_option_t *) (((u8 *) opt0) + opt0->length +
sizeof (ip6_hop_by_hop_option_t));
}
return (error0);
}
/*
* Process the Hop-by-Hop Options header
*/
VLIB_NODE_FN (ip6_hop_by_hop_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
vlib_node_runtime_t *error_node =
vlib_node_get_runtime (vm, ip6_hop_by_hop_node.index);
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
u32 n_left_from, *from, *to_next;
ip_lookup_next_t next_index;
from = vlib_frame_vector_args (frame);
n_left_from = frame->n_vectors;
next_index = node->cached_next_index;
while (n_left_from > 0)
{
u32 n_left_to_next;
vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
while (n_left_from >= 4 && n_left_to_next >= 2)
{
u32 bi0, bi1;
vlib_buffer_t *b0, *b1;
u32 next0, next1;
ip6_header_t *ip0, *ip1;
ip6_hop_by_hop_header_t *hbh0, *hbh1;
ip6_hop_by_hop_option_t *opt0, *limit0, *opt1, *limit1;
u8 error0 = 0, error1 = 0;
/* Prefetch next iteration. */
{
vlib_buffer_t *p2, *p3;
p2 = vlib_get_buffer (vm, from[2]);
p3 = vlib_get_buffer (vm, from[3]);
vlib_prefetch_buffer_header (p2, LOAD);
vlib_prefetch_buffer_header (p3, LOAD);
CLIB_PREFETCH (p2->data, 2 * CLIB_CACHE_LINE_BYTES, LOAD);
CLIB_PREFETCH (p3->data, 2 * CLIB_CACHE_LINE_BYTES, LOAD);
}
/* Speculatively enqueue b0, b1 to the current next frame */
to_next[0] = bi0 = from[0];
to_next[1] = bi1 = from[1];
from += 2;
to_next += 2;
n_left_from -= 2;
n_left_to_next -= 2;
b0 = vlib_get_buffer (vm, bi0);
b1 = vlib_get_buffer (vm, bi1);
/* Default use the next_index from the adjacency. A HBH option rarely redirects to a different node */
u32 adj_index0 = vnet_buffer (b0)->ip.adj_index[VLIB_TX];
ip_adjacency_t *adj0 = adj_get (adj_index0);
u32 adj_index1 = vnet_buffer (b1)->ip.adj_index[VLIB_TX];
ip_adjacency_t *adj1 = adj_get (adj_index1);
/* Default use the next_index from the adjacency. A HBH option rarely redirects to a different node */
next0 = adj0->lookup_next_index;
next1 = adj1->lookup_next_index;
ip0 = vlib_buffer_get_current (b0);
ip1 = vlib_buffer_get_current (b1);
hbh0 = (ip6_hop_by_hop_header_t *) (ip0 + 1);
hbh1 = (ip6_hop_by_hop_header_t *) (ip1 + 1);
opt0 = (ip6_hop_by_hop_option_t *) (hbh0 + 1);
opt1 = (ip6_hop_by_hop_option_t *) (hbh1 + 1);
limit0 =
(ip6_hop_by_hop_option_t *) ((u8 *) hbh0 +
((hbh0->length + 1) << 3));
limit1 =
(ip6_hop_by_hop_option_t *) ((u8 *) hbh1 +
((hbh1->length + 1) << 3));
/*
* Basic validity checks
*/
if ((hbh0->length + 1) << 3 >
clib_net_to_host_u16 (ip0->payload_length))
{
error0 = IP6_HOP_BY_HOP_ERROR_FORMAT;
next0 = IP_LOOKUP_NEXT_DROP;
goto outdual;
}
/* Scan the set of h-b-h options, process ones that we understand */
error0 = ip6_scan_hbh_options (b0, ip0, hbh0, opt0, limit0, &next0);
if ((hbh1->length + 1) << 3 >
clib_net_to_host_u16 (ip1->payload_length))
{
error1 = IP6_HOP_BY_HOP_ERROR_FORMAT;
next1 = IP_LOOKUP_NEXT_DROP;
goto outdual;
}
/* Scan the set of h-b-h options, process ones that we understand */
error1 = ip6_scan_hbh_options (b1, ip1, hbh1, opt1, limit1, &next1);
outdual:
/* Has the classifier flagged this buffer for special treatment? */
if (PREDICT_FALSE
((error0 == 0)
&& (vnet_buffer (b0)->l2_classify.opaque_index & OI_DECAP)))
next0 = hm->next_override;
/* Has the classifier flagged this buffer for special treatment? */
if (PREDICT_FALSE
((error1 == 0)
&& (vnet_buffer (b1)->l2_classify.opaque_index & OI_DECAP)))
next1 = hm->next_override;
if (PREDICT_FALSE ((node->flags & VLIB_NODE_FLAG_TRACE)))
{
if (b0->flags & VLIB_BUFFER_IS_TRACED)
{
ip6_hop_by_hop_trace_t *t =
vlib_add_trace (vm, node, b0, sizeof (*t));
u32 trace_len = (hbh0->length + 1) << 3;
t->next_index = next0;
/* Capture the h-b-h option verbatim */
trace_len =
trace_len <
ARRAY_LEN (t->option_data) ? trace_len :
ARRAY_LEN (t->option_data);
t->trace_len = trace_len;
clib_memcpy_fast (t->option_data, hbh0, trace_len);
}
if (b1->flags & VLIB_BUFFER_IS_TRACED)
{
ip6_hop_by_hop_trace_t *t =
vlib_add_trace (vm, node, b1, sizeof (*t));
u32 trace_len = (hbh1->length + 1) << 3;
t->next_index = next1;
/* Capture the h-b-h option verbatim */
trace_len =
trace_len <
ARRAY_LEN (t->option_data) ? trace_len :
ARRAY_LEN (t->option_data);
t->trace_len = trace_len;
clib_memcpy_fast (t->option_data, hbh1, trace_len);
}
}
b0->error = error_node->errors[error0];
b1->error = error_node->errors[error1];
/* verify speculative enqueue, maybe switch current next frame */
vlib_validate_buffer_enqueue_x2 (vm, node, next_index, to_next,
n_left_to_next, bi0, bi1, next0,
next1);
}
while (n_left_from > 0 && n_left_to_next > 0)
{
u32 bi0;
vlib_buffer_t *b0;
u32 next0;
ip6_header_t *ip0;
ip6_hop_by_hop_header_t *hbh0;
ip6_hop_by_hop_option_t *opt0, *limit0;
u8 error0 = 0;
/* Speculatively enqueue b0 to the current next frame */
bi0 = from[0];
to_next[0] = bi0;
from += 1;
to_next += 1;
n_left_from -= 1;
n_left_to_next -= 1;
b0 = vlib_get_buffer (vm, bi0);
/*
* Default use the next_index from the adjacency.
* A HBH option rarely redirects to a different node
*/
u32 adj_index0 = vnet_buffer (b0)->ip.adj_index[VLIB_TX];
ip_adjacency_t *adj0 = adj_get (adj_index0);
next0 = adj0->lookup_next_index;
ip0 = vlib_buffer_get_current (b0);
hbh0 = (ip6_hop_by_hop_header_t *) (ip0 + 1);
opt0 = (ip6_hop_by_hop_option_t *) (hbh0 + 1);
limit0 =
(ip6_hop_by_hop_option_t *) ((u8 *) hbh0 +
((hbh0->length + 1) << 3));
/*
* Basic validity checks
*/
if ((hbh0->length + 1) << 3 >
clib_net_to_host_u16 (ip0->payload_length))
{
error0 = IP6_HOP_BY_HOP_ERROR_FORMAT;
next0 = IP_LOOKUP_NEXT_DROP;
goto out0;
}
/* Scan the set of h-b-h options, process ones that we understand */
error0 = ip6_scan_hbh_options (b0, ip0, hbh0, opt0, limit0, &next0);
out0:
/* Has the classifier flagged this buffer for special treatment? */
if (PREDICT_FALSE
((error0 == 0)
&& (vnet_buffer (b0)->l2_classify.opaque_index & OI_DECAP)))
next0 = hm->next_override;
if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
{
ip6_hop_by_hop_trace_t *t =
vlib_add_trace (vm, node, b0, sizeof (*t));
u32 trace_len = (hbh0->length + 1) << 3;
t->next_index = next0;
/* Capture the h-b-h option verbatim */
trace_len =
trace_len <
ARRAY_LEN (t->option_data) ? trace_len :
ARRAY_LEN (t->option_data);
t->trace_len = trace_len;
clib_memcpy_fast (t->option_data, hbh0, trace_len);
}
b0->error = error_node->errors[error0];
/* verify speculative enqueue, maybe switch current next frame */
vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
n_left_to_next, bi0, next0);
}
vlib_put_next_frame (vm, node, next_index, n_left_to_next);
}
return frame->n_vectors;
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (ip6_hop_by_hop_node) =
{
.name = "ip6-hop-by-hop",
.sibling_of = "ip6-lookup",
.vector_size = sizeof (u32),
.format_trace = format_ip6_hop_by_hop_trace,
.type = VLIB_NODE_TYPE_INTERNAL,
.n_errors = ARRAY_LEN (ip6_hop_by_hop_error_strings),
.error_strings = ip6_hop_by_hop_error_strings,
.n_next_nodes = 0,
};
/* *INDENT-ON* */
static clib_error_t *
ip6_hop_by_hop_init (vlib_main_t * vm)
{
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
clib_memset (hm->options, 0, sizeof (hm->options));
clib_memset (hm->trace, 0, sizeof (hm->trace));
hm->next_override = IP6_LOOKUP_NEXT_POP_HOP_BY_HOP;
return (0);
}
VLIB_INIT_FUNCTION (ip6_hop_by_hop_init);
#ifndef CLIB_MARCH_VARIANT
void
ip6_hbh_set_next_override (uword next)
{
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
hm->next_override = next;
}
int
ip6_hbh_register_option (u8 option,
int options (vlib_buffer_t * b, ip6_header_t * ip,
ip6_hop_by_hop_option_t * opt),
u8 * trace (u8 * s, ip6_hop_by_hop_option_t * opt))
{
ip6_main_t *im = &ip6_main;
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
ASSERT ((u32) option < ARRAY_LEN (hm->options));
/* Already registered */
if (hm->options[option])
return (-1);
hm->options[option] = options;
hm->trace[option] = trace;
/* Set global variable */
im->hbh_enabled = 1;
return (0);
}
int
ip6_hbh_unregister_option (u8 option)
{
ip6_main_t *im = &ip6_main;
ip6_hop_by_hop_main_t *hm = &ip6_hop_by_hop_main;
ASSERT ((u32) option < ARRAY_LEN (hm->options));
/* Not registered */
if (!hm->options[option])
return (-1);
hm->options[option] = NULL;
hm->trace[option] = NULL;
/* Disable global knob if this was the last option configured */
int i;
bool found = false;
for (i = 0; i < 256; i++)
{
if (hm->options[option])
{
found = true;
break;
}
}
if (!found)
im->hbh_enabled = 0;
return (0);
}
/* Global IP6 main. */
ip6_main_t ip6_main;
#endif
static clib_error_t *
ip6_lookup_init (vlib_main_t * vm)
{
ip6_main_t *im = &ip6_main;
clib_error_t *error;
uword i;
if ((error = vlib_call_init_function (vm, vnet_feature_init)))
return error;
for (i = 0; i < ARRAY_LEN (im->fib_masks); i++)
{
u32 j, i0, i1;
i0 = i / 32;
i1 = i % 32;
for (j = 0; j < i0; j++)
im->fib_masks[i].as_u32[j] = ~0;
if (i1)
im->fib_masks[i].as_u32[i0] =
clib_host_to_net_u32 (pow2_mask (i1) << (32 - i1));
}
ip_lookup_init (&im->lookup_main, /* is_ip6 */ 1);
if (im->lookup_table_nbuckets == 0)
im->lookup_table_nbuckets = IP6_FIB_DEFAULT_HASH_NUM_BUCKETS;
im->lookup_table_nbuckets = 1 << max_log2 (im->lookup_table_nbuckets);
if (im->lookup_table_size == 0)
im->lookup_table_size = IP6_FIB_DEFAULT_HASH_MEMORY_SIZE;
clib_bihash_init_24_8 (&(im->ip6_table[IP6_FIB_TABLE_FWDING].ip6_hash),
"ip6 FIB fwding table",
im->lookup_table_nbuckets, im->lookup_table_size);
clib_bihash_init_24_8 (&im->ip6_table[IP6_FIB_TABLE_NON_FWDING].ip6_hash,
"ip6 FIB non-fwding table",
im->lookup_table_nbuckets, im->lookup_table_size);
clib_bihash_init_40_8 (&im->ip6_mtable.ip6_mhash,
"ip6 mFIB table",
im->lookup_table_nbuckets, im->lookup_table_size);
/* Create FIB with index 0 and table id of 0. */
fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, 0,
FIB_SOURCE_DEFAULT_ROUTE);
mfib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, 0,
MFIB_SOURCE_DEFAULT_ROUTE);
{
pg_node_t *pn;
pn = pg_get_node (ip6_lookup_node.index);
pn->unformat_edit = unformat_pg_ip6_header;
}
/* Unless explicitly configured, don't process HBH options */
im->hbh_enabled = 0;
return error;
}
VLIB_INIT_FUNCTION (ip6_lookup_init);
#ifndef CLIB_MARCH_VARIANT
int
vnet_set_ip6_flow_hash (u32 table_id, u32 flow_hash_config)
{
u32 fib_index;
fib_index = fib_table_find (FIB_PROTOCOL_IP6, table_id);
if (~0 == fib_index)
return VNET_API_ERROR_NO_SUCH_FIB;
fib_table_set_flow_hash_config (fib_index, FIB_PROTOCOL_IP6,
flow_hash_config);
return 0;
}
#endif
static clib_error_t *
set_ip6_flow_hash_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
int matched = 0;
u32 table_id = 0;
u32 flow_hash_config = 0;
int rv;
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (input, "table %d", &table_id))
matched = 1;
#define _(a,v) \
else if (unformat (input, #a)) { flow_hash_config |= v; matched=1;}
foreach_flow_hash_bit
#undef _
else
break;
}
if (matched == 0)
return clib_error_return (0, "unknown input `%U'",
format_unformat_error, input);
rv = vnet_set_ip6_flow_hash (table_id, flow_hash_config);
switch (rv)
{
case 0:
break;
case -1:
return clib_error_return (0, "no such FIB table %d", table_id);
default:
clib_warning ("BUG: illegal flow hash config 0x%x", flow_hash_config);
break;
}
return 0;
}
/*?
* Configure the set of IPv6 fields used by the flow hash.
*
* @cliexpar
* @parblock
* Example of how to set the flow hash on a given table:
* @cliexcmd{set ip6 flow-hash table 8 dst sport dport proto}
*
* Example of display the configured flow hash:
* @cliexstart{show ip6 fib}
* ipv6-VRF:0, fib_index 0, flow hash: src dst sport dport proto
* @::/0
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:5 buckets:1 uRPF:5 to:[0:0]]
* [0] [@0]: dpo-drop ip6
* fe80::/10
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:10 buckets:1 uRPF:10 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::1/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:8 buckets:1 uRPF:8 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::2/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:7 buckets:1 uRPF:7 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::16/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:9 buckets:1 uRPF:9 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::1:ff00:0/104
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:6 buckets:1 uRPF:6 to:[0:0]]
* [0] [@2]: dpo-receive
* ipv6-VRF:8, fib_index 1, flow hash: dst sport dport proto
* @::/0
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:21 buckets:1 uRPF:20 to:[0:0]]
* [0] [@0]: dpo-drop ip6
* @::a:1:1:0:4/126
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:27 buckets:1 uRPF:26 to:[0:0]]
* [0] [@4]: ipv6-glean: af_packet0
* @::a:1:1:0:7/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:28 buckets:1 uRPF:27 to:[0:0]]
* [0] [@2]: dpo-receive: @::a:1:1:0:7 on af_packet0
* fe80::/10
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:26 buckets:1 uRPF:25 to:[0:0]]
* [0] [@2]: dpo-receive
* fe80::fe:3eff:fe3e:9222/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:29 buckets:1 uRPF:28 to:[0:0]]
* [0] [@2]: dpo-receive: fe80::fe:3eff:fe3e:9222 on af_packet0
* ff02::1/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:24 buckets:1 uRPF:23 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::2/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:23 buckets:1 uRPF:22 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::16/128
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:25 buckets:1 uRPF:24 to:[0:0]]
* [0] [@2]: dpo-receive
* ff02::1:ff00:0/104
* unicast-ip6-chain
* [@0]: dpo-load-balance: [index:22 buckets:1 uRPF:21 to:[0:0]]
* [0] [@2]: dpo-receive
* @cliexend
* @endparblock
?*/
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (set_ip6_flow_hash_command, static) =
{
.path = "set ip6 flow-hash",
.short_help =
"set ip6 flow-hash table <table-id> [src] [dst] [sport] [dport] [proto] [reverse]",
.function = set_ip6_flow_hash_command_fn,
};
/* *INDENT-ON* */
static clib_error_t *
show_ip6_local_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
ip6_main_t *im = &ip6_main;
ip_lookup_main_t *lm = &im->lookup_main;
int i;
vlib_cli_output (vm, "Protocols handled by ip6_local");
for (i = 0; i < ARRAY_LEN (lm->local_next_by_ip_protocol); i++)
{
if (lm->local_next_by_ip_protocol[i] != IP_LOCAL_NEXT_PUNT)
{
u32 node_index = vlib_get_node (vm,
ip6_local_node.index)->
next_nodes[lm->local_next_by_ip_protocol[i]];
vlib_cli_output (vm, "%d: %U", i, format_vlib_node_name, vm,
node_index);
}
}
return 0;
}
/*?
* Display the set of protocols handled by the local IPv6 stack.
*
* @cliexpar
* Example of how to display local protocol table:
* @cliexstart{show ip6 local}
* Protocols handled by ip6_local
* 17
* 43
* 58
* 115
* @cliexend
?*/
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (show_ip6_local, static) =
{
.path = "show ip6 local",
.function = show_ip6_local_command_fn,
.short_help = "show ip6 local",
};
/* *INDENT-ON* */
#ifndef CLIB_MARCH_VARIANT
int
vnet_set_ip6_classify_intfc (vlib_main_t * vm, u32 sw_if_index,
u32 table_index)
{
vnet_main_t *vnm = vnet_get_main ();
vnet_interface_main_t *im = &vnm->interface_main;
ip6_main_t *ipm = &ip6_main;
ip_lookup_main_t *lm = &ipm->lookup_main;
vnet_classify_main_t *cm = &vnet_classify_main;
ip6_address_t *if_addr;
if (pool_is_free_index (im->sw_interfaces, sw_if_index))
return VNET_API_ERROR_NO_MATCHING_INTERFACE;
if (table_index != ~0 && pool_is_free_index (cm->tables, table_index))
return VNET_API_ERROR_NO_SUCH_ENTRY;
vec_validate (lm->classify_table_index_by_sw_if_index, sw_if_index);
lm->classify_table_index_by_sw_if_index[sw_if_index] = table_index;
if_addr = ip6_interface_first_address (ipm, sw_if_index);
if (NULL != if_addr)
{
fib_prefix_t pfx = {
.fp_len = 128,
.fp_proto = FIB_PROTOCOL_IP6,
.fp_addr.ip6 = *if_addr,
};
u32 fib_index;
fib_index = fib_table_get_index_for_sw_if_index (FIB_PROTOCOL_IP4,
sw_if_index);
if (table_index != (u32) ~ 0)
{
dpo_id_t dpo = DPO_INVALID;
dpo_set (&dpo,
DPO_CLASSIFY,
DPO_PROTO_IP6,
classify_dpo_create (DPO_PROTO_IP6, table_index));
fib_table_entry_special_dpo_add (fib_index,
&pfx,
FIB_SOURCE_CLASSIFY,
FIB_ENTRY_FLAG_NONE, &dpo);
dpo_reset (&dpo);
}
else
{
fib_table_entry_special_remove (fib_index,
&pfx, FIB_SOURCE_CLASSIFY);
}
}
return 0;
}
#endif
static clib_error_t *
set_ip6_classify_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
u32 table_index = ~0;
int table_index_set = 0;
u32 sw_if_index = ~0;
int rv;
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (input, "table-index %d", &table_index))
table_index_set = 1;
else if (unformat (input, "intfc %U", unformat_vnet_sw_interface,
vnet_get_main (), &sw_if_index))
;
else
break;
}
if (table_index_set == 0)
return clib_error_return (0, "classify table-index must be specified");
if (sw_if_index == ~0)
return clib_error_return (0, "interface / subif must be specified");
rv = vnet_set_ip6_classify_intfc (vm, sw_if_index, table_index);
switch (rv)
{
case 0:
break;
case VNET_API_ERROR_NO_MATCHING_INTERFACE:
return clib_error_return (0, "No such interface");
case VNET_API_ERROR_NO_SUCH_ENTRY:
return clib_error_return (0, "No such classifier table");
}
return 0;
}
/*?
* Assign a classification table to an interface. The classification
* table is created using the '<em>classify table</em>' and '<em>classify session</em>'
* commands. Once the table is create, use this command to filter packets
* on an interface.
*
* @cliexpar
* Example of how to assign a classification table to an interface:
* @cliexcmd{set ip6 classify intfc GigabitEthernet2/0/0 table-index 1}
?*/
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (set_ip6_classify_command, static) =
{
.path = "set ip6 classify",
.short_help =
"set ip6 classify intfc <interface> table-index <classify-idx>",
.function = set_ip6_classify_command_fn,
};
/* *INDENT-ON* */
static clib_error_t *
ip6_config (vlib_main_t * vm, unformat_input_t * input)
{
ip6_main_t *im = &ip6_main;
uword heapsize = 0;
u32 tmp;
u32 nbuckets = 0;
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (input, "hash-buckets %d", &tmp))
nbuckets = tmp;
else if (unformat (input, "heap-size %U",
unformat_memory_size, &heapsize))
;
else
return clib_error_return (0, "unknown input '%U'",
format_unformat_error, input);
}
im->lookup_table_nbuckets = nbuckets;
im->lookup_table_size = heapsize;
return 0;
}
VLIB_EARLY_CONFIG_FUNCTION (ip6_config, "ip6");
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/
|