Nick Zavaritsky | 27518c2 | 2020-02-27 15:54:58 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (c) 2020 Cisco and/or its affiliates. |
| 3 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | * you may not use this file except in compliance with the License. |
| 5 | * You may obtain a copy of the License at: |
| 6 | * |
| 7 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | * |
| 9 | * Unless required by applicable law or agreed to in writing, software |
| 10 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | * See the License for the specific language governing permissions and |
| 13 | * limitations under the License. |
| 14 | */ |
| 15 | |
| 16 | #ifndef included_ip_vtep_h |
| 17 | #define included_ip_vtep_h |
| 18 | |
| 19 | #include <vppinfra/hash.h> |
| 20 | #include <vnet/ip/ip.h> |
Neale Ranns | e403113 | 2020-10-26 13:00:06 +0000 | [diff] [blame] | 21 | #include <vnet/ip/ip46_address.h> |
Nick Zavaritsky | 27518c2 | 2020-02-27 15:54:58 +0000 | [diff] [blame] | 22 | |
| 23 | /** |
| 24 | * @brief Tunnel endpoint key (IPv4) |
| 25 | * |
| 26 | * Tunnel modules maintain a set of vtep4_key_t-s to track local IP |
| 27 | * addresses that have tunnels established. Bypass node consults the |
| 28 | * corresponding set to decide whether a packet should bypass normal |
| 29 | * processing and go directly to the tunnel protocol handler node. |
| 30 | */ |
| 31 | |
| 32 | /* *INDENT-OFF* */ |
| 33 | typedef CLIB_PACKED |
| 34 | (struct { |
| 35 | union { |
| 36 | struct { |
| 37 | ip4_address_t addr; |
| 38 | u32 fib_index; |
| 39 | }; |
| 40 | u64 as_u64; |
| 41 | }; |
| 42 | }) vtep4_key_t; |
| 43 | /* *INDENT-ON* */ |
| 44 | |
| 45 | /** |
| 46 | * @brief Tunnel endpoint key (IPv6) |
| 47 | * |
| 48 | * Tunnel modules maintain a set of vtep6_key_t-s to track local IP |
| 49 | * addresses that have tunnels established. Bypass node consults the |
| 50 | * corresponding set to decide whether a packet should bypass normal |
| 51 | * processing and go directly to the tunnel protocol handler node. |
| 52 | */ |
| 53 | |
| 54 | /* *INDENT-OFF* */ |
| 55 | typedef CLIB_PACKED |
| 56 | (struct { |
| 57 | ip6_address_t addr; |
| 58 | u32 fib_index; |
| 59 | }) vtep6_key_t; |
| 60 | /* *INDENT-ON* */ |
| 61 | |
| 62 | typedef struct |
| 63 | { |
| 64 | uword *vtep4; /* local ip4 VTEPs keyed on their ip4 addr + fib_index */ |
| 65 | uword *vtep6; /* local ip6 VTEPs keyed on their ip6 addr + fib_index */ |
| 66 | } vtep_table_t; |
| 67 | |
| 68 | always_inline vtep_table_t |
| 69 | vtep_table_create () |
| 70 | { |
| 71 | vtep_table_t t = { }; |
| 72 | t.vtep6 = hash_create_mem (0, sizeof (vtep6_key_t), sizeof (uword)); |
| 73 | return t; |
| 74 | } |
| 75 | |
| 76 | uword vtep_addr_ref (vtep_table_t * t, u32 fib_index, ip46_address_t * ip); |
| 77 | uword vtep_addr_unref (vtep_table_t * t, u32 fib_index, ip46_address_t * ip); |
| 78 | |
| 79 | always_inline void |
| 80 | vtep4_key_init (vtep4_key_t * k4) |
| 81 | { |
| 82 | k4->as_u64 = ~((u64) 0); |
| 83 | } |
| 84 | |
| 85 | always_inline void |
| 86 | vtep6_key_init (vtep6_key_t * k6) |
| 87 | { |
| 88 | ip6_address_set_zero (&k6->addr); |
| 89 | k6->fib_index = (u32) ~ 0; |
| 90 | } |
| 91 | |
| 92 | enum |
| 93 | { |
| 94 | VTEP_CHECK_FAIL = 0, |
| 95 | VTEP_CHECK_PASS = 1, |
| 96 | VTEP_CHECK_PASS_UNCHANGED = 2 |
| 97 | }; |
| 98 | |
| 99 | always_inline u8 |
| 100 | vtep4_check (vtep_table_t * t, vlib_buffer_t * b0, ip4_header_t * ip40, |
| 101 | vtep4_key_t * last_k4) |
| 102 | { |
| 103 | vtep4_key_t k4; |
| 104 | k4.addr.as_u32 = ip40->dst_address.as_u32; |
| 105 | k4.fib_index = vlib_buffer_get_ip4_fib_index (b0); |
| 106 | if (PREDICT_TRUE (k4.as_u64 == last_k4->as_u64)) |
| 107 | return VTEP_CHECK_PASS_UNCHANGED; |
| 108 | if (PREDICT_FALSE (!hash_get (t->vtep4, k4.as_u64))) |
| 109 | return VTEP_CHECK_FAIL; |
| 110 | last_k4->as_u64 = k4.as_u64; |
| 111 | return VTEP_CHECK_PASS; |
| 112 | } |
| 113 | |
Zhiyong Yang | 5e52417 | 2020-07-08 20:28:36 +0000 | [diff] [blame] | 114 | typedef struct |
| 115 | { |
| 116 | vtep4_key_t vtep4_cache[8]; |
| 117 | int idx; |
| 118 | } vtep4_cache_t; |
| 119 | |
| 120 | always_inline u8 |
| 121 | vtep4_check_vector (vtep_table_t * t, vlib_buffer_t * b0, ip4_header_t * ip40, |
| 122 | vtep4_key_t * last_k4, vtep4_cache_t * vtep4_u512) |
| 123 | { |
| 124 | vtep4_key_t k4; |
| 125 | k4.addr.as_u32 = ip40->dst_address.as_u32; |
| 126 | k4.fib_index = vlib_buffer_get_ip4_fib_index (b0); |
| 127 | |
| 128 | if (PREDICT_TRUE (k4.as_u64 == last_k4->as_u64)) |
| 129 | return VTEP_CHECK_PASS_UNCHANGED; |
| 130 | |
| 131 | #ifdef CLIB_HAVE_VEC512 |
| 132 | u64x8 k4_u64x8 = u64x8_splat (k4.as_u64); |
| 133 | u64x8 cache = u64x8_load_aligned (vtep4_u512->vtep4_cache); |
| 134 | u8 result = u64x8_mask_is_equal (cache, k4_u64x8); |
| 135 | if (PREDICT_TRUE (result != 0)) |
| 136 | { |
| 137 | k4.as_u64 = |
| 138 | vtep4_u512->vtep4_cache[count_trailing_zeros (result)].as_u64; |
| 139 | return VTEP_CHECK_PASS_UNCHANGED; |
| 140 | } |
| 141 | #endif |
| 142 | |
| 143 | if (PREDICT_FALSE (!hash_get (t->vtep4, k4.as_u64))) |
| 144 | return VTEP_CHECK_FAIL; |
| 145 | |
| 146 | last_k4->as_u64 = k4.as_u64; |
| 147 | |
| 148 | #ifdef CLIB_HAVE_VEC512 |
| 149 | vtep4_u512->vtep4_cache[vtep4_u512->idx].as_u64 = k4.as_u64; |
| 150 | vtep4_u512->idx = (vtep4_u512->idx + 1) & 0x7; |
| 151 | #endif |
| 152 | |
| 153 | return VTEP_CHECK_PASS; |
| 154 | } |
| 155 | |
Nick Zavaritsky | 27518c2 | 2020-02-27 15:54:58 +0000 | [diff] [blame] | 156 | always_inline u8 |
| 157 | vtep6_check (vtep_table_t * t, vlib_buffer_t * b0, ip6_header_t * ip60, |
| 158 | vtep6_key_t * last_k6) |
| 159 | { |
| 160 | vtep6_key_t k6; |
| 161 | k6.fib_index = vlib_buffer_get_ip6_fib_index (b0); |
| 162 | if (PREDICT_TRUE (k6.fib_index == last_k6->fib_index |
| 163 | && ip60->dst_address.as_u64[0] == last_k6->addr.as_u64[0] |
| 164 | && ip60->dst_address.as_u64[1] == |
| 165 | last_k6->addr.as_u64[1])) |
| 166 | { |
| 167 | return VTEP_CHECK_PASS_UNCHANGED; |
| 168 | } |
| 169 | k6.addr = ip60->dst_address; |
| 170 | if (PREDICT_FALSE (!hash_get_mem (t->vtep6, &k6))) |
| 171 | return VTEP_CHECK_FAIL; |
| 172 | *last_k6 = k6; |
| 173 | return VTEP_CHECK_PASS; |
| 174 | } |
| 175 | #endif /* included_ip_vtep_h */ |
| 176 | |
| 177 | /* |
| 178 | * fd.io coding-style-patch-verification: ON |
| 179 | * |
| 180 | * Local Variables: |
| 181 | * eval: (c-set-style "gnu") |
| 182 | * End: |
| 183 | */ |