{DIGIT}+:{DIGIT}+ {
uint len1 UNUSED, len2;
- u64 l;
+ u64 l, v;
char *e;
errno = 0;
{
len1 = 32;
len2 = 16;
- cf_lval.i64 = (2ULL << 48) | (((u64) l) << len2);
+ v = (2ULL << 48) | (((u64) l) << len2);
}
else
{
len1 = 16;
len2 = 32;
- cf_lval.i64 = 0 | (((u64) l) << len2);
+ v = 0 | (((u64) l) << len2);
}
errno = 0;
l = bstrtoul10(e+1, &e);
if (!e || *e || (errno == ERANGE) || (l >> len2))
cf_error("Number out of range");
- cf_lval.i64 |= l;
+ v |= l;
+ cf_lval.rd = rd_from_u64(v);
return VPN_RD;
}
[02]:{DIGIT}+:{DIGIT}+ {
uint len1, len2;
- u64 l;
+ u64 l, v;
char *e;
if (yytext[0] == '0')
{
- cf_lval.i64 = 0;
len1 = 16;
len2 = 32;
+ v = 0;
}
else
{
- cf_lval.i64 = 2ULL << 48;
len1 = 32;
len2 = 16;
+ v = 2ULL << 48;
}
errno = 0;
l = bstrtoul10(yytext+2, &e);
if (!e || (*e != ':') || (errno == ERANGE) || (l >> len1))
cf_error("ASN out of range");
- cf_lval.i64 |= ((u64) l) << len2;
+ v |= ((u64) l) << len2;
errno = 0;
l = bstrtoul10(e+1, &e);
if (!e || *e || (errno == ERANGE) || (l >> len2))
cf_error("Number out of range");
- cf_lval.i64 |= l;
+ v |= l;
+ cf_lval.rd = rd_from_u64(v);
return VPN_RD;
}
{DIGIT}+\.{DIGIT}+\.{DIGIT}+\.{DIGIT}+:{DIGIT}+ {
unsigned long int l;
ip4_addr ip4;
+ u64 v;
char *e;
- cf_lval.i64 = 1ULL << 48;
+ v = 1ULL << 48;
e = strchr(yytext, ':');
*e++ = '\0';
if (!ip4_pton(yytext, &ip4))
cf_error("Invalid IPv4 address %s in Route Distinguisher", yytext);
- cf_lval.i64 |= ((u64) ip4_to_u32(ip4)) << 16;
+ v |= ((u64) ip4_to_u32(ip4)) << 16;
errno = 0;
l = bstrtoul10(e, &e);
if (!e || *e || (errno == ERANGE) || (l >> 16))
cf_error("Number out of range");
- cf_lval.i64 |= l;
+ v |= l;
+ cf_lval.rd = rd_from_u64(v);
return VPN_RD;
}
uint i;
u32 i32;
u64 i64;
+ vpn_rd rd;
ip_addr a;
ip4_addr ip4;
ip6_addr ip6;
%token <i> NUM ENUM_TOKEN
%token <ip4> IP4
%token <ip6> IP6
-%token <i64> VPN_RD
+%token <rd> VPN_RD
%token <s> CF_SYM_KNOWN CF_SYM_UNDEFINED CF_SYM_METHOD_BARE CF_SYM_METHOD_ARGS
%token <t> TEXT
%token <bs> BYTETEXT
set_atom0:
NUM { $$.type = T_INT; $$.val.i = $1; }
| fipa { $$ = $1; }
- | VPN_RD { $$.type = T_RD; $$.val.ec = $1; }
+ | VPN_RD { $$.type = T_RD; $$.val.rd = $1; }
| ENUM_TOKEN { $$.type = pair_a($1); $$.val.i = pair_b($1); }
| '(' term ')' {
$$ = cf_eval($2, T_VOID);
| TEXT { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_STRING, .val.s = $1, }); }
| BYTETEXT { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_BYTESTRING, .val.bs = $1, }); }
| fipa { $$ = f_new_inst(FI_CONSTANT, $1); }
- | VPN_RD { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_RD, .val.ec = $1, }); }
+ | VPN_RD { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_RD, .val.rd = $1, }); }
| net_ { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_NET, .val.net = $1, }); }
| '[' ']' { $$ = f_new_inst(FI_CONSTANT, (struct f_val) { .type = T_SET, .val.t = NULL, }); }
| '[' set_items ']' {
case T_QUAD: buffer_print(buf, "%R", v->val.i); return;
case T_EC: ec_format(buf2, v->val.ec); buffer_print(buf, "%s", buf2); return;
case T_LC: lc_format(buf2, v->val.lc); buffer_print(buf, "%s", buf2); return;
- case T_RD: rd_format(v->val.ec, buf2, 1024); buffer_print(buf, "%s", buf2); return;
+ case T_RD: rd_format(v->val.rd, buf2, 1024); buffer_print(buf, "%s", buf2); return;
case T_PREFIX_SET: trie_format(v->val.ti, buf); return;
case T_SET: tree_format(v->val.t, buf); return;
case T_ENUM: buffer_print(buf, "(enum %x)%u", v->type, v->val.i); return;
uint i;
u64 ec;
lcomm lc;
+ vpn_rd rd;
ip_addr ip;
const net_addr *net;
const char *s;
METHOD_CONSTRUCTOR("rd");
if (!net_is_vpn(v1.val.net))
runtime( "VPN address expected" );
- RESULT(T_RD, ec, net_rd(v1.val.net));
+ RESULT(T_RD, rd, net_rd(v1.val.net));
}
/* Get first ASN from AS PATH */
static inline ip6_addr ip6_ntoh(ip6_addr a)
{ return _MI6(ntohl(_I0(a)), ntohl(_I1(a)), ntohl(_I2(a)), ntohl(_I3(a))); }
-#define MPLS_MAX_LABEL 0x100000
-
-#define MPLS_MAX_LABEL_STACK 8
-#define MPLS_MAX_LABEL_STRING MPLS_MAX_LABEL_STACK*12 + 5
-typedef struct mpls_label_stack {
- uint len;
- u32 stack[MPLS_MAX_LABEL_STACK];
-} mpls_label_stack;
-
-static inline int ACCESS_READ(1, 2)
-mpls_get(const char *buf, int buflen, u32 *stack)
-{
- for (int i=0; (i<MPLS_MAX_LABEL_STACK) && (i*4+3 < buflen); i++)
- {
- u32 s = get_u32(buf + i*4);
- stack[i] = s >> 12;
- if (s & 0x100)
- return i+1;
- }
- return -1;
-}
-
-static inline int
-mpls_put(char *buf, int len, u32 *stack)
-{
- for (int i=0; i<len; i++)
- put_u32(buf + i*4, stack[i] << 12 | (i+1 == len ? 0x100 : 0));
-
- return len*4;
-}
/*
* Unaligned data access (in network order)
char *ip_scope_text(uint);
+
+/*
+ * MPLS labels
+ */
+
+#define MPLS_MAX_LABEL 0x100000
+
+#define MPLS_MAX_LABEL_STACK 8
+#define MPLS_MAX_LABEL_STRING MPLS_MAX_LABEL_STACK*12 + 5
+typedef struct mpls_label_stack {
+ uint len;
+ u32 stack[MPLS_MAX_LABEL_STACK];
+} mpls_label_stack;
+
+static inline int ACCESS_READ(1, 2)
+mpls_get(const char *buf, int buflen, u32 *stack)
+{
+ for (int i=0; (i<MPLS_MAX_LABEL_STACK) && (i*4+3 < buflen); i++)
+ {
+ u32 s = get_u32(buf + i*4);
+ stack[i] = s >> 12;
+ if (s & 0x100)
+ return i+1;
+ }
+ return -1;
+}
+
+static inline int
+mpls_put(char *buf, int len, u32 *stack)
+{
+ for (int i=0; i<len; i++)
+ put_u32(buf + i*4, stack[i] << 12 | (i+1 == len ? 0x100 : 0));
+
+ return len*4;
+}
+
+
+/*
+ * VPN route distinguishers
+ */
+
+/* Using 2x u32 to avoid u64 alignment */
+typedef struct vpn_rd {
+ u32 hi;
+ u32 lo;
+} vpn_rd;
+
+#define RD_NONE (vpn_rd){}
+
+static inline vpn_rd rd_from_u64(u64 val)
+{ return (vpn_rd){.hi = val >> 32, .lo = val }; }
+
+static inline u64 rd_to_u64(vpn_rd rd)
+{ return (((u64) rd.hi) << 32) | rd.lo; }
+
+static inline int rd_equal(vpn_rd a, vpn_rd b)
+{ return a.hi == b.hi && a.lo == b.lo; }
+
+static inline int rd_zero(vpn_rd a)
+{ return !a.hi && !a.lo; }
+
+static inline int rd_nonzero(vpn_rd a)
+{ return a.hi || a.lo; }
+
+static inline int rd_compare(vpn_rd a, vpn_rd b)
+{ return uint_cmp(a.hi, b.hi) ?: uint_cmp(a.lo, b.lo); }
+
+static inline u64 rd_hash0(vpn_rd rd, u32 p, u64 acc)
+{ return u32_hash0(rd.hi, p, u32_hash0(rd.lo, p, acc)); }
+
+static inline vpn_rd get_rd(const void *buf)
+{ return (vpn_rd) { .hi = get_u32(buf), .lo = get_u32(buf + 4) }; }
+
+static inline void * put_rd(void *buf, vpn_rd rd)
+{
+ put_u32(buf, rd.hi);
+ put_u32(buf+4, rd.lo);
+ return buf+8;
+}
+
#endif
int
-rd_format(const u64 rd, char *buf, int buflen)
+rd_format(const vpn_rd rd_, char *buf, int buflen)
{
+ u64 rd = rd_to_u64(rd_);
+
switch (rd >> 48)
{
case 0: return bsnprintf(buf, buflen, "%u:%u", (u32) (rd >> 32), (u32) rd);
u8 pxlen;
u16 length;
ip4_addr prefix;
- u64 rd;
+ vpn_rd rd;
} net_addr_vpn4;
typedef struct net_addr_vpn6 {
u16 length;
ip6_addr prefix;
u32 padding;
- u64 rd;
+ vpn_rd rd;
} net_addr_vpn6;
typedef struct net_addr_roa4 {
static inline void net_fill_ip6(net_addr *a, ip6_addr prefix, uint pxlen)
{ *(net_addr_ip6 *)a = NET_ADDR_IP6(prefix, pxlen); }
-static inline void net_fill_vpn4(net_addr *a, ip4_addr prefix, uint pxlen, u64 rd)
+static inline void net_fill_vpn4(net_addr *a, ip4_addr prefix, uint pxlen, vpn_rd rd)
{ *(net_addr_vpn4 *)a = NET_ADDR_VPN4(prefix, pxlen, rd); }
-static inline void net_fill_vpn6(net_addr *a, ip6_addr prefix, uint pxlen, u64 rd)
+static inline void net_fill_vpn6(net_addr *a, ip6_addr prefix, uint pxlen, vpn_rd rd)
{ *(net_addr_vpn6 *)a = NET_ADDR_VPN6(prefix, pxlen, rd); }
static inline void net_fill_roa4(net_addr *a, ip4_addr prefix, uint pxlen, uint max_pxlen, u32 asn)
ip_addr net_pxmask(const net_addr *a);
-static inline u64 net_rd(const net_addr *a)
+static inline vpn_rd net_rd(const net_addr *a)
{
switch (a->type)
{
case NET_VPN6:
return ((net_addr_vpn6 *)a)->rd;
}
- return 0;
+ return RD_NONE;
}
{ return !a->pxlen && ip6_zero(a->prefix); }
static inline int net_zero_vpn4(const net_addr_vpn4 *a)
-{ return !a->pxlen && ip4_zero(a->prefix) && !a->rd; }
+{ return !a->pxlen && ip4_zero(a->prefix) && rd_zero(a->rd); }
static inline int net_zero_vpn6(const net_addr_vpn6 *a)
-{ return !a->pxlen && ip6_zero(a->prefix) && !a->rd; }
+{ return !a->pxlen && ip6_zero(a->prefix) && rd_zero(a->rd); }
static inline int net_zero_roa4(const net_addr_roa4 *a)
{ return !a->pxlen && ip4_zero(a->prefix) && !a->max_pxlen && !a->asn; }
{ return ip6_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen); }
static inline int net_compare_vpn4(const net_addr_vpn4 *a, const net_addr_vpn4 *b)
-{ return u64_cmp(a->rd, b->rd) ?: ip4_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen); }
+{ return rd_compare(a->rd, b->rd) ?: ip4_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen); }
static inline int net_compare_vpn6(const net_addr_vpn6 *a, const net_addr_vpn6 *b)
-{ return u64_cmp(a->rd, b->rd) ?: ip6_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen); }
+{ return rd_compare(a->rd, b->rd) ?: ip6_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen); }
static inline int net_compare_roa4(const net_addr_roa4 *a, const net_addr_roa4 *b)
{ return ip4_compare(a->prefix, b->prefix) ?: uint_cmp(a->pxlen, b->pxlen) ?: uint_cmp(a->max_pxlen, b->max_pxlen) ?: uint_cmp(a->asn, b->asn); }
static inline u32 net_hash_vpn4(const net_addr_vpn4 *n)
{
u64 acc = ip4_hash0(n->prefix, HASH_PARAM, 0) ^ (n->pxlen << 26);
- return hash_value(u64_hash0(n->rd, HASH_PARAM, acc));
+ return hash_value(rd_hash0(n->rd, HASH_PARAM, acc));
}
static inline u32 net_hash_vpn6(const net_addr_vpn6 *n)
{
u64 acc = ip6_hash0(n->prefix, HASH_PARAM, 0) ^ (n->pxlen << 26);
- return hash_value(u64_hash0(n->rd, HASH_PARAM, acc));
+ return hash_value(rd_hash0(n->rd, HASH_PARAM, acc));
}
static inline u32 net_hash_roa4(const net_addr_roa4 *n)
int net_classify(const net_addr *N);
int net_format(const net_addr *N, char *buf, int buflen) ACCESS_WRITE(2, 3);
-int rd_format(const u64 rd, char *buf, int buflen) ACCESS_WRITE(2, 3);
+int rd_format(const vpn_rd rd, char *buf, int buflen) ACCESS_WRITE(2, 3);
static inline int ipa_in_px4(ip4_addr a, ip4_addr prefix, uint pxlen)
{ return ip4_zero(ip4_and(ip4_xor(a, prefix), ip4_mkmask(pxlen))); }
bgp_encode_mpls_labels(s, s->mpls_labels, &pos, &size, pos - 1);
/* Encode route distinguisher */
- put_u64(pos, net->rd);
+ put_rd(pos, net->rd);
ADVANCE(pos, size, 8);
/* Encode prefix body */
if (l < 64)
bgp_parse_error(s, 1);
- u64 rd = get_u64(pos);
+ vpn_rd rd = get_rd(pos);
ADVANCE(pos, len, 8);
l -= 64;
bgp_encode_mpls_labels(s, s->mpls_labels, &pos, &size, pos - 1);
/* Encode route distinguisher */
- put_u64(pos, net->rd);
+ put_rd(pos, net->rd);
ADVANCE(pos, size, 8);
/* Encode prefix body */
if (l < 64)
bgp_parse_error(s, 1);
- u64 rd = get_u64(pos);
+ vpn_rd rd = get_rd(pos);
ADVANCE(pos, len, 8);
l -= 64;
case NET_VPN4:
net_fill_ip4(n, net4_prefix(n0), net4_pxlen(n0));
- src = rt_get_source(&p->p, ((const net_addr_vpn4 *) n0)->rd);
+ src = rt_get_source(&p->p, rd_to_u64(((const net_addr_vpn4 *) n0)->rd));
dst = p->ip4_channel;
export = 0;
break;
case NET_VPN6:
net_fill_ip6(n, net6_prefix(n0), net6_pxlen(n0));
- src = rt_get_source(&p->p, ((const net_addr_vpn6 *) n0)->rd);
+ src = rt_get_source(&p->p, rd_to_u64(((const net_addr_vpn6 *) n0)->rd));
dst = p->ip6_channel;
export = 0;
break;
if (!proto_cf_find_channel(CF, NET_MPLS))
cf_error("MPLS channel not specified");
- if (!cf->rd)
+ if (rd_zero(cf->rd))
cf_error("Route distinguisher not specified");
if (!cf->import_target && !cf->export_target)
!proto_configure_channel(P, &P->mpls_channel, proto_cf_find_channel(CF, NET_MPLS)))
return 0;
- if (p->rd != cf->rd)
+ if (!rd_equal(p->rd, cf->rd))
return 0;
int import_changed = !same_tree(p->import_target, cf->import_target);
struct l3vpn_config {
struct proto_config c;
- u64 rd;
+ vpn_rd rd;
struct f_tree *import_target;
struct f_tree *export_target;
};
struct channel *vpn4_channel;
struct channel *vpn6_channel;
- u64 rd;
+ vpn_rd rd;
struct f_tree *import_target;
struct f_tree *export_target;
u32 *export_target_data;