FD.io VPP  v18.04-17-g3a0d853
Vector Packet Processing
decap.c
Go to the documentation of this file.
1 /*
2  * decap.c: vxlan tunnel decap packet processing
3  *
4  * Copyright (c) 2013 Cisco and/or its affiliates.
5  * Licensed under the Apache License, Version 2.0 (the "License");
6  * you may not use this file except in compliance with the License.
7  * You may obtain a copy of the License at:
8  *
9  * http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 
18 #include <vlib/vlib.h>
19 #include <vnet/pg/pg.h>
20 #include <vnet/vxlan/vxlan.h>
21 
24 
25 typedef struct {
31 
32 static u8 * format_vxlan_rx_trace (u8 * s, va_list * args)
33 {
34  CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
35  CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
36  vxlan_rx_trace_t * t = va_arg (*args, vxlan_rx_trace_t *);
37 
38  if (t->tunnel_index != ~0)
39  {
40  s = format (s, "VXLAN decap from vxlan_tunnel%d vni %d next %d error %d",
41  t->tunnel_index, t->vni, t->next_index, t->error);
42  }
43  else
44  {
45  s = format (s, "VXLAN decap error - tunnel for vni %d does not exist",
46  t->vni);
47  }
48  return s;
49 }
50 
53 {
54  u32 sw_if_index = vnet_buffer (b)->sw_if_index[VLIB_RX];
55 
56  u32 * fib_index_by_sw_if_index = is_ip4 ?
58  u32 tx_sw_if_index = vnet_buffer (b)->sw_if_index[VLIB_TX];
59  u32 fib_index = (tx_sw_if_index == (u32) ~ 0) ?
60  vec_elt (fib_index_by_sw_if_index, sw_if_index) : tx_sw_if_index;
61 
62  return (fib_index == t->encap_fib_index);
63 }
64 
67  vlib_node_runtime_t * node,
68  vlib_frame_t * from_frame,
69  u32 is_ip4)
70 {
71  vxlan_main_t * vxm = &vxlan_main;
72  vnet_main_t * vnm = vxm->vnet_main;
74  u32 last_tunnel_index = ~0;
75  vxlan4_tunnel_key_t last_key4;
76  vxlan6_tunnel_key_t last_key6;
77  u32 pkts_decapsulated = 0;
78  u32 thread_index = vlib_get_thread_index();
79 
80  if (is_ip4)
81  last_key4.as_u64 = ~0;
82  else
83  memset (&last_key6, 0xff, sizeof (last_key6));
84 
85  u32 next_index = node->cached_next_index;
86  u32 stats_sw_if_index = node->runtime_data[0];
87  u32 stats_n_packets = 0, stats_n_bytes = 0;
88 
89  u32 * from = vlib_frame_vector_args (from_frame);
90  u32 n_left_from = from_frame->n_vectors;
91 
92  while (n_left_from > 0)
93  {
94  u32 * to_next, n_left_to_next;
95  vlib_get_next_frame (vm, node, next_index,
96  to_next, n_left_to_next);
97 
98  while (n_left_from >= 4 && n_left_to_next >= 2)
99  {
100  u32 bi0, bi1;
101  vlib_buffer_t * b0, * b1;
102  u32 next0, next1;
103  vxlan_tunnel_t * t0, * t1, * stats_t0, * stats_t1;
104 
105  /* Prefetch next iteration. */
106  {
107  vlib_buffer_t * p2, * p3;
108 
109  p2 = vlib_get_buffer (vm, from[2]);
110  p3 = vlib_get_buffer (vm, from[3]);
111 
112  vlib_prefetch_buffer_header (p2, LOAD);
113  vlib_prefetch_buffer_header (p3, LOAD);
114 
117  }
118 
119  bi0 = from[0];
120  bi1 = from[1];
121  to_next[0] = bi0;
122  to_next[1] = bi1;
123  from += 2;
124  to_next += 2;
125  n_left_to_next -= 2;
126  n_left_from -= 2;
127 
128  b0 = vlib_get_buffer (vm, bi0);
129  b1 = vlib_get_buffer (vm, bi1);
130 
131  /* udp leaves current_data pointing at the vxlan header */
132  void * cur0 = vlib_buffer_get_current (b0);
133  void * cur1 = vlib_buffer_get_current (b1);
134  vxlan_header_t * vxlan0 = cur0;
135  vxlan_header_t * vxlan1 = cur1;
136 
137  ip4_header_t * ip4_0, * ip4_1;
138  ip6_header_t * ip6_0, * ip6_1;
139  if (is_ip4) {
140  ip4_0 = cur0 - sizeof(udp_header_t) - sizeof(ip4_header_t);
141  ip4_1 = cur1 - sizeof(udp_header_t) - sizeof(ip4_header_t);
142  } else {
143  ip6_0 = cur0 - sizeof(udp_header_t) - sizeof(ip6_header_t);
144  ip6_1 = cur1 - sizeof(udp_header_t) - sizeof(ip6_header_t);
145  }
146 
147  /* pop (ip, udp, vxlan) */
148  vlib_buffer_advance (b0, sizeof *vxlan0);
149  vlib_buffer_advance (b1, sizeof *vxlan1);
150 
151  u32 tunnel_index0 = ~0, tunnel_index1 = ~0;
152  u32 error0 = 0, error1 = 0;
153 
154  if (PREDICT_FALSE (vxlan0->flags != VXLAN_FLAGS_I))
155  {
156  error0 = VXLAN_ERROR_BAD_FLAGS;
157  next0 = VXLAN_INPUT_NEXT_DROP;
158  goto trace0;
159  }
160 
161 
162  if (is_ip4) {
163  /* Make sure VXLAN tunnel exist according to packet SIP and VNI */
164  vxlan4_tunnel_key_t key4_0 = {
165  .src = ip4_0->src_address.as_u32,
166  .vni = vxlan0->vni_reserved,
167  };
168 
169  if (PREDICT_FALSE (key4_0.as_u64 != last_key4.as_u64))
170  {
171  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_0.as_u64);
172  if (PREDICT_FALSE (p == NULL))
173  {
174  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
175  next0 = VXLAN_INPUT_NEXT_DROP;
176  goto trace0;
177  }
178  last_key4 = key4_0;
179  last_tunnel_index = p[0];
180  }
181  tunnel_index0 = last_tunnel_index;
182  stats_t0 = t0 = pool_elt_at_index (vxm->tunnels, tunnel_index0);
183 
184  /* Validate VXLAN tunnel encap-fib index agaist packet */
185  if (PREDICT_FALSE (validate_vxlan_fib (b0, t0, is_ip4) == 0))
186  {
187  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
188  next0 = VXLAN_INPUT_NEXT_DROP;
189  goto trace0;
190  }
191 
192  /* Validate VXLAN tunnel SIP against packet DIP */
193  if (PREDICT_TRUE (ip4_0->dst_address.as_u32 == t0->src.ip4.as_u32))
194  goto next0; /* valid packet */
196  {
197  key4_0.src = ip4_0->dst_address.as_u32;
198  /* Make sure mcast VXLAN tunnel exist by packet DIP and VNI */
199  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_0.as_u64);
200  if (PREDICT_TRUE (p != NULL))
201  {
202  stats_t0 = pool_elt_at_index (vxm->tunnels, p[0]);
203  goto next0; /* valid packet */
204  }
205  }
206  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
207  next0 = VXLAN_INPUT_NEXT_DROP;
208  goto trace0;
209 
210  } else /* !is_ip4 */ {
211  /* Make sure VXLAN tunnel exist according to packet SIP and VNI */
212  vxlan6_tunnel_key_t key6_0 = {
213  .src = ip6_0->src_address,
214  .vni = vxlan0->vni_reserved,
215  };
216 
217  if (PREDICT_FALSE (memcmp(&key6_0, &last_key6, sizeof(last_key6)) != 0))
218  {
219  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_0);
220  if (PREDICT_FALSE (p == NULL))
221  {
222  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
223  next0 = VXLAN_INPUT_NEXT_DROP;
224  goto trace0;
225  }
226  clib_memcpy (&last_key6, &key6_0, sizeof(key6_0));
227  last_tunnel_index = p[0];
228  }
229  tunnel_index0 = last_tunnel_index;
230  stats_t0 = t0 = pool_elt_at_index (vxm->tunnels, tunnel_index0);
231 
232  /* Validate VXLAN tunnel encap-fib index agaist packet */
233  if (PREDICT_FALSE (validate_vxlan_fib (b0, t0, is_ip4) == 0))
234  {
235  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
236  next0 = VXLAN_INPUT_NEXT_DROP;
237  goto trace0;
238  }
239 
240  /* Validate VXLAN tunnel SIP against packet DIP */
242  &t0->src.ip6)))
243  goto next0; /* valid packet */
245  {
246  key6_0.src = ip6_0->dst_address;
247  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_0);
248  if (PREDICT_TRUE (p != NULL))
249  {
250  stats_t0 = pool_elt_at_index (vxm->tunnels, p[0]);
251  goto next0; /* valid packet */
252  }
253  }
254  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
255  next0 = VXLAN_INPUT_NEXT_DROP;
256  goto trace0;
257  }
258 
259  next0:
260  next0 = t0->decap_next_index;
261  u32 len0 = vlib_buffer_length_in_chain (vm, b0);
262 
263  /* Required to make the l2 tag push / pop code work on l2 subifs */
264  if (PREDICT_TRUE(next0 == VXLAN_INPUT_NEXT_L2_INPUT))
265  vnet_update_l2_len (b0);
266 
267  /* Set packet input sw_if_index to unicast VXLAN tunnel for learning */
268  vnet_buffer(b0)->sw_if_index[VLIB_RX] = t0->sw_if_index;
269 
270  /* Batch stats increment on the same vxlan tunnel so counter
271  is not incremented per packet */
272  u32 sw_if_index0 = stats_t0->sw_if_index;
273  if (PREDICT_FALSE (sw_if_index0 != stats_sw_if_index))
274  {
275  if (stats_n_packets)
276  {
279  thread_index, stats_sw_if_index,
280  stats_n_packets, stats_n_bytes);
281  pkts_decapsulated += stats_n_packets;
282  stats_n_packets = stats_n_bytes = 0;
283  }
284  stats_sw_if_index = sw_if_index0;
285  }
286  stats_n_packets += 1;
287  stats_n_bytes += len0;
288 
289  trace0:
290  b0->error = error0 ? node->errors[error0] : 0;
291 
292  if (PREDICT_FALSE(b0->flags & VLIB_BUFFER_IS_TRACED))
293  {
294  vxlan_rx_trace_t *tr
295  = vlib_add_trace (vm, node, b0, sizeof (*tr));
296  tr->next_index = next0;
297  tr->error = error0;
298  tr->tunnel_index = tunnel_index0;
299  tr->vni = vnet_get_vni (vxlan0);
300  }
301 
302  if (PREDICT_FALSE (vxlan1->flags != VXLAN_FLAGS_I))
303  {
304  error1 = VXLAN_ERROR_BAD_FLAGS;
305  next1 = VXLAN_INPUT_NEXT_DROP;
306  goto trace1;
307  }
308 
309  if (is_ip4) {
310  /* Make sure VXLAN tunnel exist according to packet SIP and VNI */
311  vxlan4_tunnel_key_t key4_1 = {
312  .src = ip4_1->src_address.as_u32,
313  .vni = vxlan1->vni_reserved
314  };
315 
316  if (PREDICT_FALSE (key4_1.as_u64 != last_key4.as_u64))
317  {
318  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_1.as_u64);
319  if (PREDICT_FALSE (p == NULL))
320  {
321  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
322  next1 = VXLAN_INPUT_NEXT_DROP;
323  goto trace1;
324  }
325  last_key4 = key4_1;
326  last_tunnel_index = p[0];
327  }
328  tunnel_index1 = last_tunnel_index;
329  stats_t1 = t1 = pool_elt_at_index (vxm->tunnels, tunnel_index1);
330 
331  /* Validate VXLAN tunnel encap-fib index against packet */
332  if (PREDICT_FALSE (validate_vxlan_fib (b1, t1, is_ip4) == 0))
333  {
334  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
335  next1 = VXLAN_INPUT_NEXT_DROP;
336  goto trace1;
337  }
338 
339  /* Validate VXLAN tunnel SIP against packet DIP */
340  if (PREDICT_TRUE (ip4_1->dst_address.as_u32 == t1->src.ip4.as_u32))
341  goto next1; /* valid packet */
343  {
344  /* Make sure mcast VXLAN tunnel exist by packet DIP and VNI */
345  key4_1.src = ip4_1->dst_address.as_u32;
346 
347  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_1.as_u64);
348  if (PREDICT_TRUE (p != NULL))
349  {
350  stats_t1 = pool_elt_at_index (vxm->tunnels, p[0]);
351  goto next1; /* valid packet */
352  }
353  }
354  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
355  next1 = VXLAN_INPUT_NEXT_DROP;
356  goto trace1;
357 
358  } else /* !is_ip4 */ {
359  /* Make sure VXLAN tunnel exist according to packet SIP and VNI */
360  vxlan6_tunnel_key_t key6_1 = {
361  .src = ip6_1->src_address,
362  .vni = vxlan1->vni_reserved,
363  };
364 
365  if (PREDICT_FALSE (memcmp(&key6_1, &last_key6, sizeof(last_key6)) != 0))
366  {
367  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_1);
368  if (PREDICT_FALSE (p == NULL))
369  {
370  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
371  next1 = VXLAN_INPUT_NEXT_DROP;
372  goto trace1;
373  }
374 
375  clib_memcpy (&last_key6, &key6_1, sizeof(key6_1));
376  last_tunnel_index = p[0];
377  }
378  tunnel_index1 = last_tunnel_index;
379  stats_t1 = t1 = pool_elt_at_index (vxm->tunnels, tunnel_index1);
380 
381  /* Validate VXLAN tunnel encap-fib index agaist packet */
382  if (PREDICT_FALSE (validate_vxlan_fib (b1, t1, is_ip4) == 0))
383  {
384  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
385  next1 = VXLAN_INPUT_NEXT_DROP;
386  goto trace1;
387  }
388 
389  /* Validate VXLAN tunnel SIP against packet DIP */
391  &t1->src.ip6)))
392  goto next1; /* valid packet */
394  {
395  key6_1.src = ip6_1->dst_address;
396 
397  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_1);
398  if (PREDICT_TRUE (p != NULL))
399  {
400  stats_t1 = pool_elt_at_index (vxm->tunnels, p[0]);
401  goto next1; /* valid packet */
402  }
403  }
404  error1 = VXLAN_ERROR_NO_SUCH_TUNNEL;
405  next1 = VXLAN_INPUT_NEXT_DROP;
406  goto trace1;
407  }
408 
409  next1:
410  next1 = t1->decap_next_index;
411  u32 len1 = vlib_buffer_length_in_chain (vm, b1);
412 
413  /* Required to make the l2 tag push / pop code work on l2 subifs */
414  if (PREDICT_TRUE(next1 == VXLAN_INPUT_NEXT_L2_INPUT))
415  vnet_update_l2_len (b1);
416 
417  /* Set packet input sw_if_index to unicast VXLAN tunnel for learning */
418  vnet_buffer(b1)->sw_if_index[VLIB_RX] = t1->sw_if_index;
419 
420  /* Batch stats increment on the same vxlan tunnel so counter
421  is not incremented per packet */
422  u32 sw_if_index1 = stats_t1->sw_if_index;
423  if (PREDICT_FALSE (sw_if_index1 != stats_sw_if_index))
424  {
425  if (stats_n_packets)
426  {
429  thread_index, stats_sw_if_index,
430  stats_n_packets, stats_n_bytes);
431  pkts_decapsulated += stats_n_packets;
432  stats_n_packets = stats_n_bytes = 0;
433  }
434  stats_sw_if_index = sw_if_index1;
435  }
436  stats_n_packets += 1;
437  stats_n_bytes += len1;
438 
439  trace1:
440  b1->error = error1 ? node->errors[error1] : 0;
441 
442  if (PREDICT_FALSE(b1->flags & VLIB_BUFFER_IS_TRACED))
443  {
444  vxlan_rx_trace_t *tr
445  = vlib_add_trace (vm, node, b1, sizeof (*tr));
446  tr->next_index = next1;
447  tr->error = error1;
448  tr->tunnel_index = tunnel_index1;
449  tr->vni = vnet_get_vni (vxlan1);
450  }
451 
452  vlib_validate_buffer_enqueue_x2 (vm, node, next_index,
453  to_next, n_left_to_next,
454  bi0, bi1, next0, next1);
455  }
456 
457  while (n_left_from > 0 && n_left_to_next > 0)
458  {
459  u32 bi0;
460  vlib_buffer_t * b0;
461  u32 next0;
462  ip4_header_t * ip4_0;
463  ip6_header_t * ip6_0;
464  vxlan_tunnel_t * t0, * stats_t0;
465 
466  bi0 = from[0];
467  to_next[0] = bi0;
468  from += 1;
469  to_next += 1;
470  n_left_from -= 1;
471  n_left_to_next -= 1;
472 
473  b0 = vlib_get_buffer (vm, bi0);
474 
475  /* udp leaves current_data pointing at the vxlan header */
476  void * cur0 = vlib_buffer_get_current (b0);
477  vxlan_header_t * vxlan0 = cur0;
478  if (is_ip4)
479  ip4_0 = cur0 -sizeof(udp_header_t) - sizeof(ip4_header_t);
480  else
481  ip6_0 = cur0 -sizeof(udp_header_t) - sizeof(ip6_header_t);
482 
483  /* pop (ip, udp, vxlan) */
484  vlib_buffer_advance (b0, sizeof(*vxlan0));
485 
486  u32 tunnel_index0 = ~0;
487  u32 error0 = 0;
488 
489  if (PREDICT_FALSE (vxlan0->flags != VXLAN_FLAGS_I))
490  {
491  error0 = VXLAN_ERROR_BAD_FLAGS;
492  next0 = VXLAN_INPUT_NEXT_DROP;
493  goto trace00;
494  }
495 
496  if (is_ip4) {
497  vxlan4_tunnel_key_t key4_0 = {
498  .src = ip4_0->src_address.as_u32,
499  .vni = vxlan0->vni_reserved,
500  };
501 
502  /* Make sure unicast VXLAN tunnel exist by packet SIP and VNI */
503  if (PREDICT_FALSE (key4_0.as_u64 != last_key4.as_u64))
504  {
505  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_0.as_u64);
506  if (PREDICT_FALSE (p == NULL))
507  {
508  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
509  next0 = VXLAN_INPUT_NEXT_DROP;
510  goto trace00;
511  }
512  last_key4 = key4_0;
513  last_tunnel_index = p[0];
514  }
515  tunnel_index0 = last_tunnel_index;
516  stats_t0 = t0 = pool_elt_at_index (vxm->tunnels, tunnel_index0);
517 
518  /* Validate VXLAN tunnel encap-fib index agaist packet */
519  if (PREDICT_FALSE (validate_vxlan_fib (b0, t0, is_ip4) == 0))
520  {
521  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
522  next0 = VXLAN_INPUT_NEXT_DROP;
523  goto trace00;
524  }
525 
526  /* Validate VXLAN tunnel SIP against packet DIP */
527  if (PREDICT_TRUE (ip4_0->dst_address.as_u32 == t0->src.ip4.as_u32))
528  goto next00; /* valid packet */
530  {
531  /* Make sure mcast VXLAN tunnel exist by packet DIP and VNI */
532  key4_0.src = ip4_0->dst_address.as_u32;
533  uword * p = hash_get (vxm->vxlan4_tunnel_by_key, key4_0.as_u64);
534  if (PREDICT_TRUE (p != NULL))
535  {
536  stats_t0 = pool_elt_at_index (vxm->tunnels, p[0]);
537  goto next00; /* valid packet */
538  }
539  }
540  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
541  next0 = VXLAN_INPUT_NEXT_DROP;
542  goto trace00;
543 
544  } else /* !is_ip4 */ {
545  /* Make sure VXLAN tunnel exist according to packet SIP and VNI */
546  vxlan6_tunnel_key_t key6_0 = {
547  .src = ip6_0->src_address,
548  .vni = vxlan0->vni_reserved,
549  };
550 
551  if (PREDICT_FALSE (memcmp(&key6_0, &last_key6, sizeof(last_key6)) != 0))
552  {
553  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_0);
554  if (PREDICT_FALSE (p == NULL))
555  {
556  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
557  next0 = VXLAN_INPUT_NEXT_DROP;
558  goto trace00;
559  }
560  clib_memcpy (&last_key6, &key6_0, sizeof(key6_0));
561  last_tunnel_index = p[0];
562  }
563  tunnel_index0 = last_tunnel_index;
564  stats_t0 = t0 = pool_elt_at_index (vxm->tunnels, tunnel_index0);
565 
566  /* Validate VXLAN tunnel encap-fib index agaist packet */
567  if (PREDICT_FALSE (validate_vxlan_fib (b0, t0, is_ip4) == 0))
568  {
569  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
570  next0 = VXLAN_INPUT_NEXT_DROP;
571  goto trace00;
572  }
573 
574  /* Validate VXLAN tunnel SIP against packet DIP */
576  &t0->src.ip6)))
577  goto next00; /* valid packet */
579  {
580  key6_0.src = ip6_0->dst_address;
581  uword * p = hash_get_mem (vxm->vxlan6_tunnel_by_key, &key6_0);
582  if (PREDICT_TRUE (p != NULL))
583  {
584  stats_t0 = pool_elt_at_index (vxm->tunnels, p[0]);
585  goto next00; /* valid packet */
586  }
587  }
588  error0 = VXLAN_ERROR_NO_SUCH_TUNNEL;
589  next0 = VXLAN_INPUT_NEXT_DROP;
590  goto trace00;
591  }
592 
593  next00:
594  next0 = t0->decap_next_index;
595  u32 len0 = vlib_buffer_length_in_chain (vm, b0);
596 
597  /* Required to make the l2 tag push / pop code work on l2 subifs */
598  if (PREDICT_TRUE(next0 == VXLAN_INPUT_NEXT_L2_INPUT))
599  vnet_update_l2_len (b0);
600 
601  /* Set packet input sw_if_index to unicast VXLAN tunnel for learning */
602  vnet_buffer(b0)->sw_if_index[VLIB_RX] = t0->sw_if_index;
603 
604  /* Batch stats increment on the same vxlan tunnel so counter
605  is not incremented per packet */
606  u32 sw_if_index0 = stats_t0->sw_if_index;
607  if (PREDICT_FALSE (sw_if_index0 != stats_sw_if_index))
608  {
609  if (stats_n_packets)
610  {
613  thread_index, stats_sw_if_index,
614  stats_n_packets, stats_n_bytes);
615  pkts_decapsulated += stats_n_packets;
616  stats_n_packets = stats_n_bytes = 0;
617  }
618  stats_sw_if_index = sw_if_index0;
619  }
620  stats_n_packets += 1;
621  stats_n_bytes += len0;
622 
623 
624  trace00:
625  b0->error = error0 ? node->errors[error0] : 0;
626 
627  if (PREDICT_FALSE(b0->flags & VLIB_BUFFER_IS_TRACED))
628  {
629  vxlan_rx_trace_t *tr
630  = vlib_add_trace (vm, node, b0, sizeof (*tr));
631  tr->next_index = next0;
632  tr->error = error0;
633  tr->tunnel_index = tunnel_index0;
634  tr->vni = vnet_get_vni (vxlan0);
635  }
636  vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
637  to_next, n_left_to_next,
638  bi0, next0);
639  }
640 
641  vlib_put_next_frame (vm, node, next_index, n_left_to_next);
642  }
643  /* Increment any remaining batch stats */
644  if (stats_n_packets)
645  {
646  pkts_decapsulated += stats_n_packets;
649  thread_index, stats_sw_if_index, stats_n_packets, stats_n_bytes);
650  node->runtime_data[0] = stats_sw_if_index;
651  }
652 
653  /* Do we still need this now that tunnel tx stats is kept? */
654  u32 node_idx = is_ip4 ? vxlan4_input_node.index : vxlan6_input_node.index;
655  vlib_node_increment_counter (vm, node_idx, VXLAN_ERROR_DECAPSULATED,
656  pkts_decapsulated);
657 
658  return from_frame->n_vectors;
659 }
660 
661 static uword
663  vlib_node_runtime_t * node,
664  vlib_frame_t * from_frame)
665 {
666  return vxlan_input(vm, node, from_frame, /* is_ip4 */ 1);
667 }
668 
669 static uword
671  vlib_node_runtime_t * node,
672  vlib_frame_t * from_frame)
673 {
674  return vxlan_input(vm, node, from_frame, /* is_ip4 */ 0);
675 }
676 
677 static char * vxlan_error_strings[] = {
678 #define vxlan_error(n,s) s,
680 #undef vxlan_error
681 #undef _
682 };
683 
685  .function = vxlan4_input,
686  .name = "vxlan4-input",
687  /* Takes a vector of packets. */
688  .vector_size = sizeof (u32),
689 
690  .n_errors = VXLAN_N_ERROR,
691  .error_strings = vxlan_error_strings,
692 
693  .n_next_nodes = VXLAN_INPUT_N_NEXT,
694  .next_nodes = {
695 #define _(s,n) [VXLAN_INPUT_NEXT_##s] = n,
697 #undef _
698  },
699 
700 //temp .format_buffer = format_vxlan_header,
701  .format_trace = format_vxlan_rx_trace,
702  // $$$$ .unformat_buffer = unformat_vxlan_header,
703 };
704 
706 
708  .function = vxlan6_input,
709  .name = "vxlan6-input",
710  /* Takes a vector of packets. */
711  .vector_size = sizeof (u32),
712 
713  .n_errors = VXLAN_N_ERROR,
714  .error_strings = vxlan_error_strings,
715 
716  .n_next_nodes = VXLAN_INPUT_N_NEXT,
717  .next_nodes = {
718 #define _(s,n) [VXLAN_INPUT_NEXT_##s] = n,
720 #undef _
721  },
722 
723 //temp .format_buffer = format_vxlan_header,
724  .format_trace = format_vxlan_rx_trace,
725  // $$$$ .unformat_buffer = unformat_vxlan_header,
726 };
727 
729 
730 
731 typedef enum {
736 
739  vlib_node_runtime_t * node,
740  vlib_frame_t * frame,
741  u32 is_ip4)
742 {
743  vxlan_main_t * vxm = &vxlan_main;
744  u32 * from, * to_next, n_left_from, n_left_to_next, next_index;
745  vlib_node_runtime_t * error_node = vlib_node_get_runtime (vm, ip4_input_node.index);
746  ip4_address_t addr4; /* last IPv4 address matching a local VTEP address */
747  ip6_address_t addr6; /* last IPv6 address matching a local VTEP address */
748 
749  from = vlib_frame_vector_args (frame);
750  n_left_from = frame->n_vectors;
751  next_index = node->cached_next_index;
752 
753  if (node->flags & VLIB_NODE_FLAG_TRACE)
754  ip4_forward_next_trace (vm, node, frame, VLIB_TX);
755 
756  if (is_ip4) addr4.data_u32 = ~0;
757  else ip6_address_set_zero (&addr6);
758 
759  while (n_left_from > 0)
760  {
761  vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
762 
763  while (n_left_from >= 4 && n_left_to_next >= 2)
764  {
765  vlib_buffer_t * b0, * b1;
766  ip4_header_t * ip40, * ip41;
767  ip6_header_t * ip60, * ip61;
768  udp_header_t * udp0, * udp1;
769  u32 bi0, ip_len0, udp_len0, flags0, next0;
770  u32 bi1, ip_len1, udp_len1, flags1, next1;
771  i32 len_diff0, len_diff1;
772  u8 error0, good_udp0, proto0;
773  u8 error1, good_udp1, proto1;
774 
775  /* Prefetch next iteration. */
776  {
777  vlib_buffer_t * p2, * p3;
778 
779  p2 = vlib_get_buffer (vm, from[2]);
780  p3 = vlib_get_buffer (vm, from[3]);
781 
782  vlib_prefetch_buffer_header (p2, LOAD);
783  vlib_prefetch_buffer_header (p3, LOAD);
784 
787  }
788 
789  bi0 = to_next[0] = from[0];
790  bi1 = to_next[1] = from[1];
791  from += 2;
792  n_left_from -= 2;
793  to_next += 2;
794  n_left_to_next -= 2;
795 
796  b0 = vlib_get_buffer (vm, bi0);
797  b1 = vlib_get_buffer (vm, bi1);
798  if (is_ip4)
799  {
800  ip40 = vlib_buffer_get_current (b0);
801  ip41 = vlib_buffer_get_current (b1);
802  }
803  else
804  {
805  ip60 = vlib_buffer_get_current (b0);
806  ip61 = vlib_buffer_get_current (b1);
807  }
808 
809  /* Setup packet for next IP feature */
810  vnet_feature_next(vnet_buffer(b0)->sw_if_index[VLIB_RX], &next0, b0);
811  vnet_feature_next(vnet_buffer(b1)->sw_if_index[VLIB_RX], &next1, b1);
812 
813  if (is_ip4)
814  {
815  /* Treat IP frag packets as "experimental" protocol for now
816  until support of IP frag reassembly is implemented */
817  proto0 = ip4_is_fragment(ip40) ? 0xfe : ip40->protocol;
818  proto1 = ip4_is_fragment(ip41) ? 0xfe : ip41->protocol;
819  }
820  else
821  {
822  proto0 = ip60->protocol;
823  proto1 = ip61->protocol;
824  }
825 
826  /* Process packet 0 */
827  if (proto0 != IP_PROTOCOL_UDP)
828  goto exit0; /* not UDP packet */
829 
830  if (is_ip4)
831  udp0 = ip4_next_header (ip40);
832  else
833  udp0 = ip6_next_header (ip60);
834 
835  if (udp0->dst_port != clib_host_to_net_u16 (UDP_DST_PORT_vxlan))
836  goto exit0; /* not VXLAN packet */
837 
838  /* Validate DIP against VTEPs*/
839  if (is_ip4)
840  {
841  if (addr4.as_u32 != ip40->dst_address.as_u32)
842  {
843  if (!hash_get (vxm->vtep4, ip40->dst_address.as_u32))
844  goto exit0; /* no local VTEP for VXLAN packet */
845  addr4 = ip40->dst_address;
846  }
847  }
848  else
849  {
850  if (!ip6_address_is_equal (&addr6, &ip60->dst_address))
851  {
852  if (!hash_get_mem (vxm->vtep6, &ip60->dst_address))
853  goto exit0; /* no local VTEP for VXLAN packet */
854  addr6 = ip60->dst_address;
855  }
856  }
857 
858  flags0 = b0->flags;
859  good_udp0 = (flags0 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
860 
861  /* Don't verify UDP checksum for packets with explicit zero checksum. */
862  good_udp0 |= udp0->checksum == 0;
863 
864  /* Verify UDP length */
865  if (is_ip4)
866  ip_len0 = clib_net_to_host_u16 (ip40->length);
867  else
868  ip_len0 = clib_net_to_host_u16 (ip60->payload_length);
869  udp_len0 = clib_net_to_host_u16 (udp0->length);
870  len_diff0 = ip_len0 - udp_len0;
871 
872  /* Verify UDP checksum */
873  if (PREDICT_FALSE (!good_udp0))
874  {
875  if ((flags0 & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED) == 0)
876  {
877  if (is_ip4)
878  flags0 = ip4_tcp_udp_validate_checksum (vm, b0);
879  else
880  flags0 = ip6_tcp_udp_icmp_validate_checksum (vm, b0);
881  good_udp0 =
882  (flags0 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
883  }
884  }
885 
886  if (is_ip4)
887  {
888  error0 = good_udp0 ? 0 : IP4_ERROR_UDP_CHECKSUM;
889  error0 = (len_diff0 >= 0) ? error0 : IP4_ERROR_UDP_LENGTH;
890  }
891  else
892  {
893  error0 = good_udp0 ? 0 : IP6_ERROR_UDP_CHECKSUM;
894  error0 = (len_diff0 >= 0) ? error0 : IP6_ERROR_UDP_LENGTH;
895  }
896 
897  next0 = error0 ?
899  b0->error = error0 ? error_node->errors[error0] : 0;
900 
901  /* vxlan-input node expect current at VXLAN header */
902  if (is_ip4)
903  vlib_buffer_advance (b0, sizeof(ip4_header_t)+sizeof(udp_header_t));
904  else
905  vlib_buffer_advance (b0, sizeof(ip6_header_t)+sizeof(udp_header_t));
906 
907  exit0:
908  /* Process packet 1 */
909  if (proto1 != IP_PROTOCOL_UDP)
910  goto exit1; /* not UDP packet */
911 
912  if (is_ip4)
913  udp1 = ip4_next_header (ip41);
914  else
915  udp1 = ip6_next_header (ip61);
916 
917  if (udp1->dst_port != clib_host_to_net_u16 (UDP_DST_PORT_vxlan))
918  goto exit1; /* not VXLAN packet */
919 
920  /* Validate DIP against VTEPs*/
921  if (is_ip4)
922  {
923  if (addr4.as_u32 != ip41->dst_address.as_u32)
924  {
925  if (!hash_get (vxm->vtep4, ip41->dst_address.as_u32))
926  goto exit1; /* no local VTEP for VXLAN packet */
927  addr4 = ip41->dst_address;
928  }
929  }
930  else
931  {
932  if (!ip6_address_is_equal (&addr6, &ip61->dst_address))
933  {
934  if (!hash_get_mem (vxm->vtep6, &ip61->dst_address))
935  goto exit1; /* no local VTEP for VXLAN packet */
936  addr6 = ip61->dst_address;
937  }
938  }
939 
940  flags1 = b1->flags;
941  good_udp1 = (flags1 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
942 
943  /* Don't verify UDP checksum for packets with explicit zero checksum. */
944  good_udp1 |= udp1->checksum == 0;
945 
946  /* Verify UDP length */
947  if (is_ip4)
948  ip_len1 = clib_net_to_host_u16 (ip41->length);
949  else
950  ip_len1 = clib_net_to_host_u16 (ip61->payload_length);
951  udp_len1 = clib_net_to_host_u16 (udp1->length);
952  len_diff1 = ip_len1 - udp_len1;
953 
954  /* Verify UDP checksum */
955  if (PREDICT_FALSE (!good_udp1))
956  {
957  if ((flags1 & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED) == 0)
958  {
959  if (is_ip4)
960  flags1 = ip4_tcp_udp_validate_checksum (vm, b1);
961  else
962  flags1 = ip6_tcp_udp_icmp_validate_checksum (vm, b1);
963  good_udp1 =
964  (flags1 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
965  }
966  }
967 
968  if (is_ip4)
969  {
970  error1 = good_udp1 ? 0 : IP4_ERROR_UDP_CHECKSUM;
971  error1 = (len_diff1 >= 0) ? error1 : IP4_ERROR_UDP_LENGTH;
972  }
973  else
974  {
975  error1 = good_udp1 ? 0 : IP6_ERROR_UDP_CHECKSUM;
976  error1 = (len_diff1 >= 0) ? error1 : IP6_ERROR_UDP_LENGTH;
977  }
978 
979  next1 = error1 ?
981  b1->error = error1 ? error_node->errors[error1] : 0;
982 
983  /* vxlan-input node expect current at VXLAN header */
984  if (is_ip4)
985  vlib_buffer_advance (b1, sizeof(ip4_header_t)+sizeof(udp_header_t));
986  else
987  vlib_buffer_advance (b1, sizeof(ip6_header_t)+sizeof(udp_header_t));
988 
989  exit1:
990  vlib_validate_buffer_enqueue_x2 (vm, node, next_index,
991  to_next, n_left_to_next,
992  bi0, bi1, next0, next1);
993  }
994 
995  while (n_left_from > 0 && n_left_to_next > 0)
996  {
997  vlib_buffer_t * b0;
998  ip4_header_t * ip40;
999  ip6_header_t * ip60;
1000  udp_header_t * udp0;
1001  u32 bi0, ip_len0, udp_len0, flags0, next0;
1002  i32 len_diff0;
1003  u8 error0, good_udp0, proto0;
1004 
1005  bi0 = to_next[0] = from[0];
1006  from += 1;
1007  n_left_from -= 1;
1008  to_next += 1;
1009  n_left_to_next -= 1;
1010 
1011  b0 = vlib_get_buffer (vm, bi0);
1012  if (is_ip4)
1013  ip40 = vlib_buffer_get_current (b0);
1014  else
1015  ip60 = vlib_buffer_get_current (b0);
1016 
1017  /* Setup packet for next IP feature */
1018  vnet_feature_next(vnet_buffer(b0)->sw_if_index[VLIB_RX], &next0, b0);
1019 
1020  if (is_ip4)
1021  /* Treat IP4 frag packets as "experimental" protocol for now
1022  until support of IP frag reassembly is implemented */
1023  proto0 = ip4_is_fragment(ip40) ? 0xfe : ip40->protocol;
1024  else
1025  proto0 = ip60->protocol;
1026 
1027  if (proto0 != IP_PROTOCOL_UDP)
1028  goto exit; /* not UDP packet */
1029 
1030  if (is_ip4)
1031  udp0 = ip4_next_header (ip40);
1032  else
1033  udp0 = ip6_next_header (ip60);
1034 
1035  if (udp0->dst_port != clib_host_to_net_u16 (UDP_DST_PORT_vxlan))
1036  goto exit; /* not VXLAN packet */
1037 
1038  /* Validate DIP against VTEPs*/
1039  if (is_ip4)
1040  {
1041  if (addr4.as_u32 != ip40->dst_address.as_u32)
1042  {
1043  if (!hash_get (vxm->vtep4, ip40->dst_address.as_u32))
1044  goto exit; /* no local VTEP for VXLAN packet */
1045  addr4 = ip40->dst_address;
1046  }
1047  }
1048  else
1049  {
1050  if (!ip6_address_is_equal (&addr6, &ip60->dst_address))
1051  {
1052  if (!hash_get_mem (vxm->vtep6, &ip60->dst_address))
1053  goto exit; /* no local VTEP for VXLAN packet */
1054  addr6 = ip60->dst_address;
1055  }
1056  }
1057 
1058  flags0 = b0->flags;
1059  good_udp0 = (flags0 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
1060 
1061  /* Don't verify UDP checksum for packets with explicit zero checksum. */
1062  good_udp0 |= udp0->checksum == 0;
1063 
1064  /* Verify UDP length */
1065  if (is_ip4)
1066  ip_len0 = clib_net_to_host_u16 (ip40->length);
1067  else
1068  ip_len0 = clib_net_to_host_u16 (ip60->payload_length);
1069  udp_len0 = clib_net_to_host_u16 (udp0->length);
1070  len_diff0 = ip_len0 - udp_len0;
1071 
1072  /* Verify UDP checksum */
1073  if (PREDICT_FALSE (!good_udp0))
1074  {
1075  if ((flags0 & VNET_BUFFER_F_L4_CHECKSUM_COMPUTED) == 0)
1076  {
1077  if (is_ip4)
1078  flags0 = ip4_tcp_udp_validate_checksum (vm, b0);
1079  else
1080  flags0 = ip6_tcp_udp_icmp_validate_checksum (vm, b0);
1081  good_udp0 =
1082  (flags0 & VNET_BUFFER_F_L4_CHECKSUM_CORRECT) != 0;
1083  }
1084  }
1085 
1086  if (is_ip4)
1087  {
1088  error0 = good_udp0 ? 0 : IP4_ERROR_UDP_CHECKSUM;
1089  error0 = (len_diff0 >= 0) ? error0 : IP4_ERROR_UDP_LENGTH;
1090  }
1091  else
1092  {
1093  error0 = good_udp0 ? 0 : IP6_ERROR_UDP_CHECKSUM;
1094  error0 = (len_diff0 >= 0) ? error0 : IP6_ERROR_UDP_LENGTH;
1095  }
1096 
1097  next0 = error0 ?
1099  b0->error = error0 ? error_node->errors[error0] : 0;
1100 
1101  /* vxlan-input node expect current at VXLAN header */
1102  if (is_ip4)
1103  vlib_buffer_advance (b0, sizeof(ip4_header_t)+sizeof(udp_header_t));
1104  else
1105  vlib_buffer_advance (b0, sizeof(ip6_header_t)+sizeof(udp_header_t));
1106 
1107  exit:
1108  vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
1109  to_next, n_left_to_next,
1110  bi0, next0);
1111  }
1112 
1113  vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1114  }
1115 
1116  return frame->n_vectors;
1117 }
1118 
1119 static uword
1121  vlib_node_runtime_t * node,
1122  vlib_frame_t * frame)
1123 {
1124  return ip_vxlan_bypass_inline (vm, node, frame, /* is_ip4 */ 1);
1125 }
1126 
1128  .function = ip4_vxlan_bypass,
1129  .name = "ip4-vxlan-bypass",
1130  .vector_size = sizeof (u32),
1131 
1132  .n_next_nodes = IP_VXLAN_BYPASS_N_NEXT,
1133  .next_nodes = {
1134  [IP_VXLAN_BYPASS_NEXT_DROP] = "error-drop",
1135  [IP_VXLAN_BYPASS_NEXT_VXLAN] = "vxlan4-input",
1136  },
1137 
1138  .format_buffer = format_ip4_header,
1139  .format_trace = format_ip4_forward_next_trace,
1140 };
1141 
1143 
1144 /* Dummy init function to get us linked in. */
1146 { return 0; }
1147 
1149 
1150 static uword
1152  vlib_node_runtime_t * node,
1153  vlib_frame_t * frame)
1154 {
1155  return ip_vxlan_bypass_inline (vm, node, frame, /* is_ip4 */ 0);
1156 }
1157 
1159  .function = ip6_vxlan_bypass,
1160  .name = "ip6-vxlan-bypass",
1161  .vector_size = sizeof (u32),
1162 
1163  .n_next_nodes = IP_VXLAN_BYPASS_N_NEXT,
1164  .next_nodes = {
1165  [IP_VXLAN_BYPASS_NEXT_DROP] = "error-drop",
1166  [IP_VXLAN_BYPASS_NEXT_VXLAN] = "vxlan6-input",
1167  },
1168 
1169  .format_buffer = format_ip6_header,
1170  .format_trace = format_ip6_forward_next_trace,
1171 };
1172 
1174 
1175 /* Dummy init function to get us linked in. */
1177 { return 0; }
1178 
#define CLIB_UNUSED(x)
Definition: clib.h:79
static u32 validate_vxlan_fib(vlib_buffer_t *b, vxlan_tunnel_t *t, u32 is_ip4)
Definition: decap.c:52
static void vlib_increment_combined_counter(vlib_combined_counter_main_t *cm, u32 thread_index, u32 index, u64 n_packets, u64 n_bytes)
Increment a combined counter.
Definition: counter.h:211
u8 runtime_data[0]
Function dependent node-runtime data.
Definition: node.h:464
ip4_address_t src_address
Definition: ip4_packet.h:164
uword * vtep6
Definition: vxlan.h:151
vnet_interface_main_t interface_main
Definition: vnet.h:56
format_function_t format_ip4_header
Definition: format.h:86
vlib_node_registration_t vxlan4_input_node
(constructor) VLIB_REGISTER_NODE (vxlan4_input_node)
Definition: decap.c:22
#define foreach_vxlan_input_next
Definition: vxlan.h:122
#define PREDICT_TRUE(x)
Definition: clib.h:106
#define NULL
Definition: clib.h:55
static uword vxlan_input(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *from_frame, u32 is_ip4)
Definition: decap.c:66
u32 * fib_index_by_sw_if_index
Table index indexed by software interface.
Definition: ip4.h:111
u8 * format(u8 *s, const char *fmt,...)
Definition: format.c:419
vlib_node_registration_t ip4_vxlan_bypass_node
(constructor) VLIB_REGISTER_NODE (ip4_vxlan_bypass_node)
Definition: decap.c:1127
vlib_error_t * errors
Vector of errors for this node.
Definition: node.h:415
static uword vlib_buffer_length_in_chain(vlib_main_t *vm, vlib_buffer_t *b)
Get length in bytes of the buffer chain.
Definition: buffer_funcs.h:107
ip6_address_t src_address
Definition: ip6_packet.h:342
static uword ip6_vxlan_bypass(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame)
Definition: decap.c:1151
#define VXLAN_FLAGS_I
Definition: vxlan_packet.h:52
vnet_main_t * vnet_main
Definition: vxlan.h:161
u32 tunnel_index
Definition: decap.c:27
#define VLIB_INIT_FUNCTION(x)
Definition: init.h:111
#define always_inline
Definition: clib.h:92
ip4_address_t dst_address
Definition: ip4_packet.h:164
vlib_combined_counter_main_t * combined_sw_if_counters
Definition: interface.h:718
static uword ip6_address_is_equal(ip6_address_t *a, ip6_address_t *b)
Definition: ip6_packet.h:209
int i32
Definition: types.h:81
#define vlib_prefetch_buffer_header(b, type)
Prefetch buffer metadata.
Definition: buffer.h:191
static void * ip4_next_header(ip4_header_t *i)
Definition: ip4_packet.h:233
static int ip4_is_fragment(ip4_header_t *i)
Definition: ip4_packet.h:205
#define hash_get(h, key)
Definition: hash.h:248
#define pool_elt_at_index(p, i)
Returns pointer to element at given index.
Definition: pool.h:461
vlib_node_registration_t ip4_input_node
Global ip4 input node.
Definition: ip4_input.c:277
uword * vxlan4_tunnel_by_key
Definition: vxlan.h:145
vlib_node_registration_t ip6_vxlan_bypass_node
(constructor) VLIB_REGISTER_NODE (ip6_vxlan_bypass_node)
Definition: decap.c:1158
static void * vlib_buffer_get_current(vlib_buffer_t *b)
Get pointer to current data to process.
Definition: buffer.h:209
vxlan_main_t vxlan_main
Definition: vxlan.c:41
static uword ip4_address_is_multicast(ip4_address_t *a)
Definition: ip4_packet.h:310
#define PREDICT_FALSE(x)
Definition: clib.h:105
u32 ip4_tcp_udp_validate_checksum(vlib_main_t *vm, vlib_buffer_t *p0)
Definition: ip4_forward.c:1099
vlib_node_registration_t vxlan6_input_node
(constructor) VLIB_REGISTER_NODE (vxlan6_input_node)
Definition: decap.c:23
#define vlib_validate_buffer_enqueue_x2(vm, node, next_index, to_next, n_left_to_next, bi0, bi1, next0, next1)
Finish enqueueing two buffers forward in the graph.
Definition: buffer_node.h:70
static_always_inline void vnet_feature_next(u32 sw_if_index, u32 *next0, vlib_buffer_t *b0)
Definition: feature.h:221
#define vlib_validate_buffer_enqueue_x1(vm, node, next_index, to_next, n_left_to_next, bi0, next0)
Finish enqueueing one buffer forward in the graph.
Definition: buffer_node.h:218
#define vlib_get_next_frame(vm, node, next_index, vectors, n_vectors_left)
Get pointer to next frame vector data by (vlib_node_runtime_t, next_index).
Definition: node_funcs.h:364
vlib_error_t error
Error code for buffers to be enqueued to error handler.
Definition: buffer.h:130
static void vlib_node_increment_counter(vlib_main_t *vm, u32 node_index, u32 counter_index, u64 increment)
Definition: node_funcs.h:1166
#define VLIB_REGISTER_NODE(x,...)
Definition: node.h:143
static u32 vnet_get_vni(vxlan_header_t *h)
Definition: vxlan_packet.h:54
static uword vxlan4_input(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *from_frame)
Definition: decap.c:662
u16 n_vectors
Definition: node.h:344
static_always_inline uword vlib_get_thread_index(void)
Definition: threads.h:221
#define CLIB_PREFETCH(addr, size, type)
Definition: cache.h:74
vlib_main_t * vm
Definition: buffer.c:294
static void ip6_address_set_zero(ip6_address_t *a)
Definition: ip6_packet.h:244
static char * vxlan_error_strings[]
Definition: decap.c:677
static vlib_node_runtime_t * vlib_node_get_runtime(vlib_main_t *vm, u32 node_index)
Get node runtime by node index.
Definition: node_funcs.h:89
#define clib_memcpy(a, b, c)
Definition: string.h:75
void vlib_put_next_frame(vlib_main_t *vm, vlib_node_runtime_t *r, u32 next_index, u32 n_vectors_left)
Release pointer to next frame vector data.
Definition: main.c:454
u32 decap_next_index
Definition: vxlan.h:89
static void * ip6_next_header(ip6_header_t *i)
Definition: ip6_packet.h:369
ip_vxan_bypass_next_t
Definition: decap.c:864
u16 cached_next_index
Next frame index that vector arguments were last enqueued to last time this node ran.
Definition: node.h:456
unsigned int u32
Definition: types.h:88
ip6_main_t ip6_main
Definition: ip6_forward.c:2750
uword * vtep4
Definition: vxlan.h:150
uword * vxlan6_tunnel_by_key
Definition: vxlan.h:146
u32 sw_if_index
Definition: vxlan.h:95
static void vlib_buffer_advance(vlib_buffer_t *b, word l)
Advance current data pointer by the supplied (signed!) amount.
Definition: buffer.h:222
format_function_t format_ip6_header
Definition: format.h:98
u64 uword
Definition: types.h:112
static void * vlib_add_trace(vlib_main_t *vm, vlib_node_runtime_t *r, vlib_buffer_t *b, u32 n_data_bytes)
Definition: trace_funcs.h:55
#define vec_elt(v, i)
Get vector value at index i.
struct _vlib_node_registration vlib_node_registration_t
Definition: defs.h:47
static uword ip6_address_is_multicast(ip6_address_t *a)
Definition: ip6_packet.h:146
u16 payload_length
Definition: ip6_packet.h:333
u32 ip6_tcp_udp_icmp_validate_checksum(vlib_main_t *vm, vlib_buffer_t *p0)
Definition: ip6_forward.c:941
unsigned char u8
Definition: types.h:56
static void vnet_update_l2_len(vlib_buffer_t *b)
Definition: l2_input.h:217
void ip4_forward_next_trace(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame, vlib_rx_or_tx_t which_adj_index)
Definition: ip4_forward.c:953
static void * vlib_frame_vector_args(vlib_frame_t *f)
Get pointer to frame vector data.
Definition: node_funcs.h:267
u32 encap_fib_index
Definition: vxlan.h:92
u8 * format_ip4_forward_next_trace(u8 *s, va_list *args)
Definition: ip4_forward.c:905
#define hash_get_mem(h, key)
Definition: hash.h:268
#define vnet_buffer(b)
Definition: buffer.h:372
VLIB_NODE_FUNCTION_MULTIARCH(l2t_decap_node, l2t_decap_node_fn)
static u8 * format_vxlan_rx_trace(u8 *s, va_list *args)
Definition: decap.c:32
ip4_main_t ip4_main
Global ip4 main structure.
Definition: ip4_forward.c:818
u8 data[0]
Packet data.
Definition: buffer.h:179
clib_error_t * ip6_vxlan_bypass_init(vlib_main_t *vm)
Definition: decap.c:1176
u16 flags
Copy of main node flags.
Definition: node.h:450
#define VLIB_NODE_FLAG_TRACE
Definition: node.h:259
u32 next_index
Definition: decap.c:26
#define CLIB_CACHE_LINE_BYTES
Definition: cache.h:59
u32 flags
buffer flags: VLIB_BUFFER_FREE_LIST_INDEX_MASK: bits used to store free list index, VLIB_BUFFER_IS_TRACED: trace this buffer.
Definition: buffer.h:111
static uword ip4_vxlan_bypass(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame)
Definition: decap.c:1120
u32 * fib_index_by_sw_if_index
Definition: ip6.h:176
static vlib_buffer_t * vlib_get_buffer(vlib_main_t *vm, u32 buffer_index)
Translate buffer index into buffer pointer.
Definition: buffer_funcs.h:57
vxlan_tunnel_t * tunnels
Definition: vxlan.h:142
static uword ip_vxlan_bypass_inline(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame, u32 is_ip4)
Definition: decap.c:738
ip46_address_t src
Definition: vxlan.h:82
static uword vxlan6_input(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *from_frame)
Definition: decap.c:670
Definition: defs.h:46
ip6_address_t dst_address
Definition: ip6_packet.h:342
clib_error_t * ip4_vxlan_bypass_init(vlib_main_t *vm)
Definition: decap.c:1145
u8 * format_ip6_forward_next_trace(u8 *s, va_list *args)
Definition: ip6_forward.c:723