blob: c587c86801f63d359817fa6a6ac741c13ad2a7a8 [file] [log] [blame]
Klement Sekera0e3c0de2016-09-29 14:43:44 +02001/*
2 * Copyright (c) 2011-2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15/**
16 * @file
17 * @brief BFD global declarations
18 */
19#ifndef __included_bfd_main_h__
20#define __included_bfd_main_h__
21
22#include <vppinfra/timing_wheel.h>
23#include <vnet/vnet.h>
24#include <vnet/bfd/bfd_protocol.h>
25#include <vnet/bfd/bfd_udp.h>
Damjan Marion07a38572018-01-21 06:44:18 -080026#include <vlib/log.h>
Dave Barach1e3417f2018-07-25 08:30:27 -040027#include <vppinfra/os.h>
Klement Sekera0e3c0de2016-09-29 14:43:44 +020028
Klement Sekera0e3c0de2016-09-29 14:43:44 +020029#define foreach_bfd_mode(F) \
30 F (asynchronous) \
31 F (demand)
32
33typedef enum
34{
35#define F(x) BFD_MODE_##x,
36 foreach_bfd_mode (F)
37#undef F
38} bfd_mode_e;
39
40typedef struct
41{
Klement Sekerab16bfe32017-02-28 11:56:48 +010042 /** global configuration key ID */
Klement Sekerab17dd962017-01-09 07:43:48 +010043 u32 conf_key_id;
44
Klement Sekerab16bfe32017-02-28 11:56:48 +010045 /** keeps track of how many sessions reference this key */
Klement Sekerab17dd962017-01-09 07:43:48 +010046 u32 use_count;
47
Klement Sekerab16bfe32017-02-28 11:56:48 +010048 /**
Klement Sekerab17dd962017-01-09 07:43:48 +010049 * key data directly usable for bfd purposes - already padded with zeroes
50 * (so we don't need the actual length)
51 */
52 u8 key[20];
53
Klement Sekerab16bfe32017-02-28 11:56:48 +010054 /** authentication type for this key */
Klement Sekerab17dd962017-01-09 07:43:48 +010055 bfd_auth_type_e auth_type;
56} bfd_auth_key_t;
57
Klement Sekera239790f2017-02-16 10:53:53 +010058#define foreach_bfd_poll_state(F) \
59 F (NOT_NEEDED) \
60 F (NEEDED) \
61 F (IN_PROGRESS) \
62 F (IN_PROGRESS_AND_QUEUED)
Klement Sekeraa57a9702017-02-02 06:58:07 +010063
64typedef enum
65{
Klement Sekera239790f2017-02-16 10:53:53 +010066#define F(x) BFD_POLL_##x,
Klement Sekeraa57a9702017-02-02 06:58:07 +010067 foreach_bfd_poll_state (F)
68#undef F
69} bfd_poll_state_e;
70
Neale Ranns88fc83e2017-04-05 08:11:14 -070071/**
72 * hop types
73 */
74#define foreach_bfd_hop(F) \
75 F (SINGLE, "single") \
76 F (MULTI, "multi") \
77
78typedef enum
79{
80#define F(sym, str) BFD_HOP_TYPE_##sym,
81 foreach_bfd_hop (F)
82#undef F
83} bfd_hop_type_e;
84
Klement Sekera2bce0332017-02-09 06:03:46 +010085typedef struct bfd_session_s
Klement Sekerab17dd962017-01-09 07:43:48 +010086{
Klement Sekerab16bfe32017-02-28 11:56:48 +010087 /** index in bfd_main.sessions pool */
Klement Sekera637b9c42016-12-08 05:19:14 +010088 u32 bs_idx;
Klement Sekera0e3c0de2016-09-29 14:43:44 +020089
Klement Sekerab16bfe32017-02-28 11:56:48 +010090 /** session state */
Klement Sekera0e3c0de2016-09-29 14:43:44 +020091 bfd_state_e local_state;
92
Klement Sekerab16bfe32017-02-28 11:56:48 +010093 /** remote session state */
Klement Sekera73884482017-02-23 09:26:30 +010094 bfd_state_e remote_state;
95
Neale Ranns88fc83e2017-04-05 08:11:14 -070096 /** BFD hop type */
97 bfd_hop_type_e hop_type;
98
Klement Sekerab16bfe32017-02-28 11:56:48 +010099 /** local diagnostics */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200100 bfd_diag_code_e local_diag;
101
Klement Sekerab16bfe32017-02-28 11:56:48 +0100102 /** remote diagnostics */
Klement Sekera73884482017-02-23 09:26:30 +0100103 bfd_diag_code_e remote_diag;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200104
Klement Sekerab16bfe32017-02-28 11:56:48 +0100105 /** local discriminator */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200106 u32 local_discr;
107
Klement Sekerab16bfe32017-02-28 11:56:48 +0100108 /** remote discriminator */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200109 u32 remote_discr;
110
Klement Sekerab16bfe32017-02-28 11:56:48 +0100111 /** configured desired min tx interval (microseconds) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100112 u32 config_desired_min_tx_usec;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200113
Klement Sekerab16bfe32017-02-28 11:56:48 +0100114 /** configured desired min tx interval (clocks) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100115 u64 config_desired_min_tx_clocks;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200116
Klement Sekerab16bfe32017-02-28 11:56:48 +0100117 /** effective desired min tx interval (clocks) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100118 u64 effective_desired_min_tx_clocks;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200119
Klement Sekerab16bfe32017-02-28 11:56:48 +0100120 /** configured required min rx interval (microseconds) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100121 u32 config_required_min_rx_usec;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200122
Klement Sekerab16bfe32017-02-28 11:56:48 +0100123 /** configured required min rx interval (clocks) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100124 u64 config_required_min_rx_clocks;
125
Klement Sekerab16bfe32017-02-28 11:56:48 +0100126 /** effective required min rx interval (clocks) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100127 u64 effective_required_min_rx_clocks;
Klement Sekera3e0a3562016-12-19 09:05:21 +0100128
Klement Sekerab16bfe32017-02-28 11:56:48 +0100129 /** remote min rx interval (microseconds) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100130 u64 remote_min_rx_usec;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200131
Klement Sekerab16bfe32017-02-28 11:56:48 +0100132 /** remote min rx interval (clocks) */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200133 u64 remote_min_rx_clocks;
134
Klement Sekerab16bfe32017-02-28 11:56:48 +0100135 /** remote min echo rx interval (microseconds) */
Klement Sekera239790f2017-02-16 10:53:53 +0100136 u64 remote_min_echo_rx_usec;
137
Klement Sekerab16bfe32017-02-28 11:56:48 +0100138 /** remote min echo rx interval (clocks) */
Klement Sekera239790f2017-02-16 10:53:53 +0100139 u64 remote_min_echo_rx_clocks;
140
Klement Sekerab16bfe32017-02-28 11:56:48 +0100141 /** remote desired min tx interval (clocks) */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100142 u64 remote_desired_min_tx_clocks;
143
Klement Sekerab16bfe32017-02-28 11:56:48 +0100144 /** configured detect multiplier */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100145 u8 local_detect_mult;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200146
Klement Sekerab16bfe32017-02-28 11:56:48 +0100147 /** 1 if remote system sets demand mode, 0 otherwise */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200148 u8 remote_demand;
149
Klement Sekerab16bfe32017-02-28 11:56:48 +0100150 /** remote detect multiplier */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200151 u8 remote_detect_mult;
152
Klement Sekerab16bfe32017-02-28 11:56:48 +0100153 /** 1 is echo function is active, 0 otherwise */
Klement Sekera239790f2017-02-16 10:53:53 +0100154 u8 echo;
155
Klement Sekerab16bfe32017-02-28 11:56:48 +0100156 /** set to value of timer in timing wheel, 0 if never set */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200157 u64 wheel_time_clocks;
158
Klement Sekerab16bfe32017-02-28 11:56:48 +0100159 /** transmit interval */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200160 u64 transmit_interval_clocks;
161
Klement Sekerab16bfe32017-02-28 11:56:48 +0100162 /** next time at which to transmit a packet */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200163 u64 tx_timeout_clocks;
164
Klement Sekerab16bfe32017-02-28 11:56:48 +0100165 /** timestamp of last packet transmitted */
Klement Sekera3e0a3562016-12-19 09:05:21 +0100166 u64 last_tx_clocks;
167
Klement Sekerab16bfe32017-02-28 11:56:48 +0100168 /** timestamp of last packet received */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200169 u64 last_rx_clocks;
170
Klement Sekerab16bfe32017-02-28 11:56:48 +0100171 /** transmit interval for echo packets */
Klement Sekera239790f2017-02-16 10:53:53 +0100172 u64 echo_transmit_interval_clocks;
173
Klement Sekerab16bfe32017-02-28 11:56:48 +0100174 /** next time at which to transmit echo packet */
Klement Sekera239790f2017-02-16 10:53:53 +0100175 u64 echo_tx_timeout_clocks;
176
Klement Sekerab16bfe32017-02-28 11:56:48 +0100177 /** timestamp of last echo packet transmitted */
Klement Sekera239790f2017-02-16 10:53:53 +0100178 u64 echo_last_tx_clocks;
179
Klement Sekerab16bfe32017-02-28 11:56:48 +0100180 /** timestamp of last echo packet received */
Klement Sekera239790f2017-02-16 10:53:53 +0100181 u64 echo_last_rx_clocks;
182
Klement Sekerab16bfe32017-02-28 11:56:48 +0100183 /** secret used for calculating/checking checksum of echo packets */
Klement Sekera239790f2017-02-16 10:53:53 +0100184 u32 echo_secret;
185
Klement Sekerab16bfe32017-02-28 11:56:48 +0100186 /** detection time */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200187 u64 detection_time_clocks;
188
Klement Sekerab16bfe32017-02-28 11:56:48 +0100189 /** state info regarding poll sequence */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100190 bfd_poll_state_e poll_state;
191
Klement Sekerab16bfe32017-02-28 11:56:48 +0100192 /**
Klement Sekera239790f2017-02-16 10:53:53 +0100193 * helper for delayed poll sequence - marks either start of running poll
194 * sequence or timeout, after which we can start the next poll sequnce
195 */
196 u64 poll_state_start_or_timeout_clocks;
197
Klement Sekerab16bfe32017-02-28 11:56:48 +0100198 /** authentication information */
Klement Sekerab17dd962017-01-09 07:43:48 +0100199 struct
200 {
Klement Sekerab16bfe32017-02-28 11:56:48 +0100201 /** current key in use */
Klement Sekerab17dd962017-01-09 07:43:48 +0100202 bfd_auth_key_t *curr_key;
203
Klement Sekerab16bfe32017-02-28 11:56:48 +0100204 /**
Klement Sekerab17dd962017-01-09 07:43:48 +0100205 * set to next key to use if delayed switch is enabled - in that case
206 * the key is switched when first incoming packet is signed with next_key
207 */
208 bfd_auth_key_t *next_key;
209
Klement Sekerab16bfe32017-02-28 11:56:48 +0100210 /** sequence number incremented occasionally or always (if meticulous) */
Klement Sekerab17dd962017-01-09 07:43:48 +0100211 u32 local_seq_number;
212
Klement Sekerab16bfe32017-02-28 11:56:48 +0100213 /** remote sequence number */
Klement Sekerab17dd962017-01-09 07:43:48 +0100214 u32 remote_seq_number;
215
Klement Sekerab16bfe32017-02-28 11:56:48 +0100216 /** set to 1 if remote sequence number is known */
Klement Sekerab17dd962017-01-09 07:43:48 +0100217 u8 remote_seq_number_known;
218
Klement Sekerab16bfe32017-02-28 11:56:48 +0100219 /** current key ID sent out in bfd packet */
Klement Sekerab17dd962017-01-09 07:43:48 +0100220 u8 curr_bfd_key_id;
221
Klement Sekerab16bfe32017-02-28 11:56:48 +0100222 /** key ID to use when switched to next_key */
Klement Sekerab17dd962017-01-09 07:43:48 +0100223 u8 next_bfd_key_id;
224
Klement Sekerab16bfe32017-02-28 11:56:48 +0100225 /**
Klement Sekerab17dd962017-01-09 07:43:48 +0100226 * set to 1 if delayed action is pending, which might be activation
227 * of authentication, change of key or deactivation
228 */
229 u8 is_delayed;
230 } auth;
231
Klement Sekerab16bfe32017-02-28 11:56:48 +0100232 /** transport type for this session */
Klement Sekera239790f2017-02-16 10:53:53 +0100233 bfd_transport_e transport;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200234
Klement Sekerab16bfe32017-02-28 11:56:48 +0100235 /** union of transport-specific data */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200236 union
237 {
238 bfd_udp_session_t udp;
239 };
240} bfd_session_t;
241
Neale Ranns88fc83e2017-04-05 08:11:14 -0700242/**
243 * listener events
244 */
245#define foreach_bfd_listen_event(F) \
246 F (CREATE, "sesion-created") \
247 F (UPDATE, "session-updated") \
248 F (DELETE, "session-deleted")
249
250typedef enum
251{
252#define F(sym, str) BFD_LISTEN_EVENT_##sym,
253 foreach_bfd_listen_event (F)
254#undef F
255} bfd_listen_event_e;
256
257/**
258 * session nitification call back function type
259 */
260typedef void (*bfd_notify_fn_t) (bfd_listen_event_e, const bfd_session_t *);
261
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200262typedef struct
263{
Dave Barach1e3417f2018-07-25 08:30:27 -0400264 /** lock to protect data structures */
265 clib_spinlock_t lock;
266 int lock_recursion_count;
267 uword owner_thread_index;
268
269 /** Number of event wakeup RPCs in flight. Should be 0 or 1 */
270 int bfd_process_wakeup_events_in_flight;
271
272 /** The timestamp of last wakeup event being sent */
273 u64 bfd_process_wakeup_event_start_clocks;
274
275 /** The time it took the last wakeup event to make it to handling */
276 u64 bfd_process_wakeup_event_delay_clocks;
277
278 /** When the bfd process is supposed to wake up next */
279 u64 bfd_process_next_wakeup_clocks;
280
Klement Sekerab16bfe32017-02-28 11:56:48 +0100281 /** pool of bfd sessions context data */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200282 bfd_session_t *sessions;
283
Klement Sekerab16bfe32017-02-28 11:56:48 +0100284 /** timing wheel for scheduling timeouts */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200285 timing_wheel_t wheel;
286
Klement Sekerab16bfe32017-02-28 11:56:48 +0100287 /** timing wheel inaccuracy, in clocks */
Klement Sekera637b9c42016-12-08 05:19:14 +0100288 u64 wheel_inaccuracy;
289
Klement Sekerab16bfe32017-02-28 11:56:48 +0100290 /** hashmap - bfd session by discriminator */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200291 u32 *session_by_disc;
292
Klement Sekerab16bfe32017-02-28 11:56:48 +0100293 /** background process node index */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200294 u32 bfd_process_node_index;
295
Klement Sekerab16bfe32017-02-28 11:56:48 +0100296 /** convenience variables */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200297 vlib_main_t *vlib_main;
298 vnet_main_t *vnet_main;
299
Klement Sekerab16bfe32017-02-28 11:56:48 +0100300 /** cpu clocks per second */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200301 f64 cpu_cps;
302
Klement Sekerab16bfe32017-02-28 11:56:48 +0100303 /** default desired min tx in clocks */
Klement Sekeraa57a9702017-02-02 06:58:07 +0100304 u64 default_desired_min_tx_clocks;
305
Klement Sekerab16bfe32017-02-28 11:56:48 +0100306 /** minimum required min rx while echo function is active - clocks */
Klement Sekera239790f2017-02-16 10:53:53 +0100307 u64 min_required_min_rx_while_echo_clocks;
308
Klement Sekerab16bfe32017-02-28 11:56:48 +0100309 /** for generating random numbers */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200310 u32 random_seed;
311
Klement Sekerab16bfe32017-02-28 11:56:48 +0100312 /** pool of authentication keys */
Klement Sekerab17dd962017-01-09 07:43:48 +0100313 bfd_auth_key_t *auth_keys;
314
Klement Sekerab16bfe32017-02-28 11:56:48 +0100315 /** hashmap - index in pool auth_keys by conf_key_id */
Klement Sekerab17dd962017-01-09 07:43:48 +0100316 u32 *auth_key_by_conf_key_id;
317
Damjan Marion07a38572018-01-21 06:44:18 -0800318 /** vector of callback notification functions */
Neale Ranns88fc83e2017-04-05 08:11:14 -0700319 bfd_notify_fn_t *listeners;
Damjan Marion07a38572018-01-21 06:44:18 -0800320
321 /** log class */
322 vlib_log_class_t log_class;
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200323} bfd_main_t;
324
325extern bfd_main_t bfd_main;
326
Klement Sekerab16bfe32017-02-28 11:56:48 +0100327/** Packet counters */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200328#define foreach_bfd_error(F) \
329 F (NONE, "good bfd packets (processed)") \
330 F (BAD, "invalid bfd packets") \
331 F (DISABLED, "bfd packets received on disabled interfaces")
332
333typedef enum
334{
335#define F(sym, str) BFD_ERROR_##sym,
336 foreach_bfd_error (F)
337#undef F
338 BFD_N_ERROR,
339} bfd_error_t;
340
Klement Sekerab16bfe32017-02-28 11:56:48 +0100341/** bfd packet trace capture */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200342typedef struct
343{
344 u32 len;
345 u8 data[400];
346} bfd_input_trace_t;
347
348enum
349{
350 BFD_EVENT_RESCHEDULE = 1,
351 BFD_EVENT_NEW_SESSION,
Klement Sekeraa57a9702017-02-02 06:58:07 +0100352 BFD_EVENT_CONFIG_CHANGED,
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200353} bfd_process_event_e;
354
Klement Sekera239790f2017-02-16 10:53:53 +0100355/* *INDENT-OFF* */
Klement Sekerab16bfe32017-02-28 11:56:48 +0100356/** echo packet structure */
Klement Sekera239790f2017-02-16 10:53:53 +0100357typedef CLIB_PACKED (struct {
Klement Sekerab16bfe32017-02-28 11:56:48 +0100358 /** local discriminator */
Klement Sekera239790f2017-02-16 10:53:53 +0100359 u32 discriminator;
Klement Sekerab16bfe32017-02-28 11:56:48 +0100360 /** expire time of this packet - clocks */
Klement Sekera239790f2017-02-16 10:53:53 +0100361 u64 expire_time_clocks;
Klement Sekerab16bfe32017-02-28 11:56:48 +0100362 /** checksum - based on discriminator, local secret and expire time */
Klement Sekera239790f2017-02-16 10:53:53 +0100363 u64 checksum;
364}) bfd_echo_pkt_t;
365/* *INDENT-ON* */
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200366
Dave Barach1e3417f2018-07-25 08:30:27 -0400367static inline void
368bfd_lock (bfd_main_t * bm)
369{
370 uword my_thread_index = __os_thread_index;
371
372 if (bm->owner_thread_index == my_thread_index
373 && bm->lock_recursion_count > 0)
374 {
375 bm->lock_recursion_count++;
376 return;
377 }
378
379 clib_spinlock_lock_if_init (&bm->lock);
380 bm->lock_recursion_count = 1;
381 bm->owner_thread_index = my_thread_index;
382}
383
384static inline void
385bfd_unlock (bfd_main_t * bm)
386{
387 uword my_thread_index = __os_thread_index;
388 ASSERT (bm->owner_thread_index == my_thread_index);
389
390 if (bm->lock_recursion_count > 1)
391 {
392 bm->lock_recursion_count--;
393 return;
394 }
395 bm->lock_recursion_count = 0;
396 bm->owner_thread_index = ~0;
397 clib_spinlock_unlock_if_init (&bm->lock);
398}
399
Dave Barach1e3417f2018-07-25 08:30:27 -0400400static inline void
401bfd_lock_check (bfd_main_t * bm)
402{
403 if (PREDICT_FALSE (bm->lock_recursion_count < 1))
Dave Barachccf444d2018-09-14 09:27:42 -0400404 clib_warning ("lock check failure");
Dave Barach1e3417f2018-07-25 08:30:27 -0400405}
406
Klement Sekera239790f2017-02-16 10:53:53 +0100407u8 *bfd_input_format_trace (u8 * s, va_list * args);
408bfd_session_t *bfd_get_session (bfd_main_t * bm, bfd_transport_e t);
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200409void bfd_put_session (bfd_main_t * bm, bfd_session_t * bs);
410bfd_session_t *bfd_find_session_by_idx (bfd_main_t * bm, uword bs_idx);
411bfd_session_t *bfd_find_session_by_disc (bfd_main_t * bm, u32 disc);
412void bfd_session_start (bfd_main_t * bm, bfd_session_t * bs);
413void bfd_consume_pkt (bfd_main_t * bm, const bfd_pkt_t * bfd, u32 bs_idx);
Klement Sekera239790f2017-02-16 10:53:53 +0100414int bfd_consume_echo_pkt (bfd_main_t * bm, vlib_buffer_t * b);
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200415int bfd_verify_pkt_common (const bfd_pkt_t * pkt);
Klement Sekerab17dd962017-01-09 07:43:48 +0100416int bfd_verify_pkt_auth (const bfd_pkt_t * pkt, u16 pkt_size,
417 bfd_session_t * bs);
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200418void bfd_event (bfd_main_t * bm, bfd_session_t * bs);
Klement Sekerab17dd962017-01-09 07:43:48 +0100419void bfd_init_final_control_frame (vlib_main_t * vm, vlib_buffer_t * b,
Klement Sekerae50e8562017-04-04 16:19:48 +0200420 bfd_main_t * bm, bfd_session_t * bs,
421 int is_local);
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200422u8 *format_bfd_session (u8 * s, va_list * args);
Damjan Marion07a38572018-01-21 06:44:18 -0800423u8 *format_bfd_session_brief (u8 * s, va_list * args);
Klement Sekera73884482017-02-23 09:26:30 +0100424u8 *format_bfd_auth_key (u8 * s, va_list * args);
Klement Sekerab17dd962017-01-09 07:43:48 +0100425void bfd_session_set_flags (bfd_session_t * bs, u8 admin_up_down);
426unsigned bfd_auth_type_supported (bfd_auth_type_e auth_type);
427vnet_api_error_t bfd_auth_activate (bfd_session_t * bs, u32 conf_key_id,
428 u8 bfd_key_id, u8 is_delayed);
429vnet_api_error_t bfd_auth_deactivate (bfd_session_t * bs, u8 is_delayed);
Klement Sekera239790f2017-02-16 10:53:53 +0100430vnet_api_error_t bfd_session_set_params (bfd_main_t * bm, bfd_session_t * bs,
431 u32 desired_min_tx_usec,
432 u32 required_min_rx_usec,
433 u8 detect_mult);
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200434
Klement Sekera73884482017-02-23 09:26:30 +0100435u32 bfd_clocks_to_usec (const bfd_main_t * bm, u64 clocks);
436const char *bfd_poll_state_string (bfd_poll_state_e state);
437
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200438#define USEC_PER_MS 1000LL
439#define USEC_PER_SECOND (1000 * USEC_PER_MS)
440
Klement Sekerab16bfe32017-02-28 11:56:48 +0100441/** default, slow transmission interval for BFD packets, per spec at least 1s */
Klement Sekera239790f2017-02-16 10:53:53 +0100442#define BFD_DEFAULT_DESIRED_MIN_TX_USEC USEC_PER_SECOND
443
Klement Sekerab16bfe32017-02-28 11:56:48 +0100444/**
Klement Sekera239790f2017-02-16 10:53:53 +0100445 * minimum required min rx set locally when echo function is used, per spec
446 * should be set to at least 1s
447 */
448#define BFD_REQUIRED_MIN_RX_USEC_WHILE_ECHO USEC_PER_SECOND
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200449
Neale Ranns88fc83e2017-04-05 08:11:14 -0700450/**
451 * Register a callback function to receive session notifications.
452 */
453void bfd_register_listener (bfd_notify_fn_t fn);
454
Klement Sekera0e3c0de2016-09-29 14:43:44 +0200455#endif /* __included_bfd_main_h__ */
456
457/*
458 * fd.io coding-style-patch-verification: ON
459 *
460 * Local Variables:
461 * eval: (c-set-style "gnu")
462 * End:
463 */