OpenSDN source code
All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Friends Macros Pages
diag_pkt_handler.cc
Go to the documentation of this file.
1 /*
2  * * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved.
3  * */
4 
5 #include <stdint.h>
6 #include "base/os.h"
7 #include <map>
8 #include "vr_defs.h"
9 #include "base/timer.h"
10 #include "cmn/agent_cmn.h"
11 #include "pkt/proto.h"
12 #include "pkt/proto_handler.h"
13 #include "diag/diag_pkt_handler.h"
14 #include "diag/diag.h"
15 #include "diag/diag_proto.h"
16 #include "diag/ping.h"
17 #include "diag/overlay_ping.h"
19 #include "oper/mirror_table.h"
20 #include <oper/bridge_route.h>
21 #include <oper/vxlan.h>
22 #include <netinet/icmp6.h>
24 
25 using namespace boost::posix_time;
27  AgentDiagPktData *ad = (AgentDiagPktData *)pkt_info_->data;
28  ad->op_ = htonl(AgentDiagPktData::DIAG_REPLY);
29 }
30 
32  uint8_t proto;
33  if (pkt_info_->ip) {
34  proto = pkt_info_->ip->ip_p;
35  } else {
36  proto = pkt_info_->ip6->ip6_nxt;
37  }
38  switch(proto) {
39  case IPPROTO_TCP:
40  pkt_info_->transp.tcp->th_sum = 0xffff;
41  break;
42 
43  case IPPROTO_UDP:
44  pkt_info_->transp.udp->uh_sum = 0xffff;
45  break;
46 
47  case IPPROTO_ICMP:
48  pkt_info_->transp.icmp->icmp_cksum = 0xffff;
49  break;
50  case IPPROTO_ICMPV6:
51  pkt_info_->transp.icmp6->icmp6_cksum = 0xffff;
52  break;
53 
54  default:
55  break;
56  }
57 }
58 
60  SetReply();
61  Swap();
62  SetDiagChkSum();
63 }
64 
66  BuildReply();
67  Send(GetInterfaceIndex(), GetVrfIndex(), AgentHdr::TX_ROUTE,
68  CMD_PARAM_PACKET_CTRL, CMD_PARAM_1_DIAG, PktHandler::DIAG);
69 }
70 
72  diag_table_->diag_proto()->IncrementDiagStats(GetInterfaceIndex(),
74  BuildReply();
75  Send(GetInterfaceIndex(), GetVrfIndex(), AgentHdr::TX_SWITCH,
76  CMD_PARAM_PACKET_CTRL, CMD_PARAM_1_DIAG, PktHandler::DIAG);
77  diag_table_->diag_proto()->IncrementDiagStats(GetInterfaceIndex(),
79 }
80 
82  if (pkt_info_->agent_hdr.cmd == AgentHdr::TRAP_ZERO_TTL ||
83  pkt_info_->agent_hdr.cmd == AgentHdr::TRAP_ICMP_ERROR)
84  return true;
85 
86  return false;
87 }
88 
90  if (pkt_info_->agent_hdr.cmd == AgentHdr::TRAP_ROUTER_ALERT)
91  return true;
92  return false;
93 }
94 
96 
97  uint32_t rabit = 0;
98  uint8_t ttl;
99  if (pkt_info_->ether_type == ETHERTYPE_IP) {
100  ttl = pkt_info_->ip->ip_ttl;
101  } else if (pkt_info_->ether_type == ETHERTYPE_IPV6) {
102  ttl = pkt_info_->ip6->ip6_ctlun.ip6_un1.ip6_un1_hlim;
103  } else {
104  return true;
105  }
106 
107  if (ttl == 0 ) {
108  if (pkt_info_->dport == VXLAN_UDP_DEST_PORT) {
109  VxlanHdr *vxlan = (VxlanHdr *)(pkt_info_->transp.udp + 1);
110  rabit = ntohl(vxlan->reserved) & OverlayPing::kVxlanRABit;
111  }
112 
113  if (rabit) {
114  SendOverlayResponse();
115  } else {
116  if (pkt_info_->ether_type == ETHERTYPE_IP) {
117  SendTimeExceededPacket();
118  } else {
119  SendTimeExceededV6Packet();
120  }
121  }
122  return true;
123  }
124  return HandleTraceRouteResponse();
125 }
126 
127 // Send time exceeded ICMP packet
129  // send IP header + 128 bytes from incoming pkt in the icmp response
130  uint16_t icmp_len = pkt_info_->ip->ip_hl * 4 + 128;
131  if (ntohs(pkt_info_->ip->ip_len) < icmp_len)
132  icmp_len = ntohs(pkt_info_->ip->ip_len);
133  boost::scoped_array<uint8_t> icmp_payload(new uint8_t[icmp_len]);
134  memcpy(icmp_payload.get(), pkt_info_->ip, icmp_len);
135  DiagEntry::DiagKey key = -1;
136  if (!ParseIcmpData(icmp_payload.get(), icmp_len, (uint16_t *)&key, true))
137  return;
138 
139  char *ptr = (char *)pkt_info_->pkt;
140  uint16_t buf_len = pkt_info_->max_pkt_len;
141 
142  // Retain the agent-header before ethernet header
143  uint16_t len = (char *)pkt_info_->eth - (char *)pkt_info_->pkt;
144 
145  Ip4Address src_ip(0);
146  VmInterface *vm_itf = dynamic_cast<VmInterface *>
147  (agent()->interface_table()->FindInterface(GetInterfaceIndex()));
148  if (vm_itf == NULL) {
149  src_ip = agent()->router_id();
150  } else {
151  if (vm_itf->vn() == NULL) {
152  return;
153  }
154  const VnIpam *ipam = vm_itf->vn()->GetIpam(pkt_info_->ip_saddr.to_v4());
155  if (ipam == NULL) {
156  return;
157  }
158  src_ip = ipam->default_gw.to_v4();
159  }
160 
161  // Form ICMP Packet with EthHdr - IP Header - ICMP Header
162  len += EthHdr(ptr + len, buf_len - len, agent()->vhost_interface()->mac(),
163  MacAddress(pkt_info_->eth->ether_shost), ETHERTYPE_IP,
165 
166  uint16_t ip_len = sizeof(iphdr) + 8 + icmp_len;
167  len += IpHdr(ptr + len, buf_len - len, ip_len,
168  htonl(src_ip.to_ulong()),
169  htonl(pkt_info_->ip_saddr.to_v4().to_ulong()),
170  IPPROTO_ICMP, DEFAULT_IP_ID, DEFAULT_IP_TTL);
171 
172  struct icmp *hdr = (struct icmp *) (ptr + len);
173  memset((uint8_t *)hdr, 0, 8);
174  hdr->icmp_type = ICMP_TIME_EXCEEDED;
175  hdr->icmp_code = ICMP_EXC_TTL;
176  memcpy(ptr + len + 8, icmp_payload.get(), icmp_len);
177  IcmpChecksum((char *)hdr, 8 + icmp_len);
178  len += 8 + icmp_len;
179 
180  pkt_info_->set_len(len);
181 
182  Send(GetInterfaceIndex(), pkt_info_->vrf, AgentHdr::TX_SWITCH,
184 }
185 
186 
188  uint8_t icmp_payload[icmp_payload_len];
189  uint16_t icmp_len = ntohs(pkt_info_->ip6->ip6_plen);
190 
191  if (icmp_len > icmp_payload_len)
192  icmp_len = icmp_payload_len;
193  memcpy(icmp_payload, pkt_info_->ip6, icmp_len);
194 
195  DiagEntry::DiagKey key = -1;
196  if (!ParseIcmpData(icmp_payload, icmp_len, (uint16_t *)&key, false))
197  return;
198 
199  char *buff = (char *)pkt_info_->pkt;
200  uint16_t buff_len = pkt_info_->max_pkt_len;
201  // Retain the agent-header before ethernet header
202 
203  uint16_t eth_len = EthHdr(buff, buff_len, GetInterfaceIndex(),
204  agent()->vhost_interface()->mac(),
205  MacAddress(pkt_info_->eth->ether_shost),
206  ETHERTYPE_IPV6);
207 
208  VmInterface *vm_itf = dynamic_cast<VmInterface *>
209  (agent()->interface_table()->FindInterface(GetInterfaceIndex()));
210  if (vm_itf == NULL || vm_itf->layer3_forwarding() == false ||
211  vm_itf->vn() == NULL) {
212  return;
213  }
214 
215  const VnIpam *ipam = vm_itf->vn()->GetIpam(pkt_info_->ip_saddr.to_v6());
216  if (ipam == NULL)
217  return ;
218 
219  pkt_info_->ip6 = (struct ip6_hdr *)(buff + eth_len);
220  Ip6Hdr(pkt_info_->ip6, icmp_len+ICMP_UNREACH_HDR_LEN, IPV6_ICMP_NEXT_HEADER,
221  DEFAULT_IP_TTL, ipam->default_gw.to_v6().to_bytes().data(),
222  pkt_info_->ip_saddr.to_v6().to_bytes().data());
223 
224  icmp6_hdr *icmp = pkt_info_->transp.icmp6 =
225  (icmp6_hdr *)(pkt_info_->pkt + eth_len
226  + sizeof(ip6_hdr));
227  icmp->icmp6_type = ICMP_TIME_EXCEEDED;
228  icmp->icmp6_code = ICMP_EXC_TTL;
229  icmp->icmp6_mtu = 0;
230  icmp->icmp6_cksum = 0;
231  icmp->icmp6_cksum =
232  Icmpv6Csum(ipam->default_gw.to_v6().to_bytes().data(),
233  pkt_info_->ip_saddr.to_v6().to_bytes().data(),
234  icmp, icmp_len);
235  memcpy(buff + sizeof(ip6_hdr) + eth_len+ICMP_UNREACH_HDR_LEN,
236  icmp_payload, icmp_len);
237  pkt_info_->set_len(icmp_len + sizeof(ip6_hdr) + eth_len+ICMP_UNREACH_HDR_LEN);
238 
239  uint16_t command =
240  (pkt_info_->agent_hdr.cmd == AgentHdr::TRAP_TOR_CONTROL_PKT) ?
242 
243  Send(GetInterfaceIndex(), pkt_info_->vrf, command,
245 
246 }
247 
249  uint8_t *data = (uint8_t *)(pkt_info_->transp.icmp) + 8;
250  uint16_t len = pkt_info_->len - (data - pkt_info_->pkt);
251  bool is_v4 = pkt_info_->ether_type == ETHERTYPE_IP;
252  DiagEntry::DiagKey key = -1;
253  // if it is Overlay packet get the key from Oam data
254  if (IsOverlayPingPacket()) {
255  OverlayOamPktData *oamdata = (OverlayOamPktData *) pkt_info_->data;
256  key = ntohs(oamdata->org_handle_);
257  } else {
258  if (!ParseIcmpData(data, len, (uint16_t *)&key, is_v4))
259  return true;
260  }
261 
262  DiagEntry *entry = diag_table_->Find(key);
263  if (!entry) return true;
264 
265  if (is_v4)
266  address_ = pkt_info_->ip_saddr.to_v4().to_string();
267  else {
268  address_ = pkt_info_->ip_saddr.to_v6().to_string();
269  }
270  entry->HandleReply(this);
271 
272  DiagEntryOp *op;
273  if (IsDone()) {
274  op = new DiagEntryOp(DiagEntryOp::DEL, entry);
275  } else {
276  op = new DiagEntryOp(DiagEntryOp::RETRY, entry);
277  }
278  entry->diag_table()->Enqueue(op);
279 
280  return true;
281 }
282 
283 bool DiagPktHandler::ParseIcmpData(const uint8_t *data, uint16_t data_len,
284  uint16_t *key, bool is_v4) {
285  if (data_len < sizeof(struct ip))
286  return false;
287  struct ip *ip_hdr = (struct ip *)(data);
288  *key = ntohs(ip_hdr->ip_id);
289  uint16_t len = sizeof(struct ip);
290  uint8_t protocol;
291 
292  if (ip_hdr->ip_src.s_addr == htonl(agent()->router_id().to_ulong()) ||
293  ip_hdr->ip_dst.s_addr == htonl(agent()->router_id().to_ulong())) {
294  // Check inner header
295  switch (ip_hdr->ip_p) {
296  case IPPROTO_GRE : {
297  if (data_len < len + sizeof(GreHdr))
298  return true;
299  len += sizeof(GreHdr);
300  break;
301  }
302 
303  case IPPROTO_UDP : {
304  if (data_len < len + sizeof(udphdr))
305  return true;
306  len += sizeof(udphdr);
307  break;
308  }
309 
310  default: {
311  return true;
312  }
313  }
314  len += sizeof(MplsHdr);
315  if (is_v4) {
316  if (data_len < len + sizeof(struct ip))
317  return true;
318  ip_hdr = (struct ip *)(data + len);
319  len += sizeof(struct ip);
320  protocol = ip_hdr->ip_p;
321  } else {
322  if (data_len < len + sizeof(struct ip6_hdr))
323  return true;
324  struct ip6_hdr *ip6_hdr = (struct ip6_hdr *)(data + len);
325  len += sizeof(struct ip6_hdr);
326  protocol = ip6_hdr->ip6_nxt;
327  }
328  switch (protocol) {
329  case IPPROTO_TCP:
330  len += sizeof(tcphdr);
331  break;
332 
333  case IPPROTO_UDP:
334  len += sizeof(udphdr);
335  break;
336 
337  case IPPROTO_ICMP:
338  len += 8;
339  break;
340  case IPPROTO_ICMPV6:
341  len += 8;
342  break;
343  default:
344  return true;
345  }
346  if (data_len < len + sizeof(AgentDiagPktData))
347  return true;
348 
349  AgentDiagPktData *agent_data = (AgentDiagPktData *)(data + len);
350  if (ntohl(agent_data->op_) == AgentDiagPktData::DIAG_REQUEST) {
351  agent_data->op_ = htonl(AgentDiagPktData::DIAG_REPLY);
352  } else if (ntohl(agent_data->op_) == AgentDiagPktData::DIAG_REPLY) {
353  *key = ntohs(agent_data->key_);
354  done_ = true;
355  }
356  }
357 
358  return true;
359 }
360 
362  bool isoverlay_packet = IsOverlayPingPacket();
363  AgentDiagPktData *ad = NULL;
364  AgentDiagPktData tempdata;
365 
366  if (IsTraceRoutePacket()) {
367  return HandleTraceRoutePacket();
368  }
369 
370  if (isoverlay_packet) {
371  // Process Overlay packet
372  // papulate diag data AgentDiagPktData here
373  memset((void*)&tempdata, 0, sizeof(AgentDiagPktData));
374  ad = &tempdata;
375  OverlayOamPktData *oamdata = (OverlayOamPktData *) pkt_info_->data;
377  ad->op_ = htonl(AgentDiagPktData::DIAG_REQUEST);
378  } else if (oamdata->msg_type_ == OverlayOamPktData::OVERLAY_ECHO_REPLY) {
379  ad->op_ = htonl(AgentDiagPktData::DIAG_REPLY);
380  }
381 
382  ad->key_ = oamdata->org_handle_;
383  } else {
384  ad = (AgentDiagPktData *)pkt_info_->data;
385  }
386 
387  if (!ad) {
388  //Ignore if packet doesnt have proper L4 header
389  return true;
390  }
391 
392  SegmentHealthCheckPkt *segment_hc_pkt = NULL;
393  DiagEntry::DiagKey key = ntohs(ad->key_);
394  DiagEntry *entry = diag_table_->Find(key);
395  if (entry) {
396  segment_hc_pkt = dynamic_cast< SegmentHealthCheckPkt * >(entry);
397  }
398  if (ntohl(ad->op_) == AgentDiagPktData::DIAG_REQUEST) {
399  //Request received swap the packet
400  //and dump the packet back
401  if (isoverlay_packet) {
402  // Reply packet with after setting the TLV content.
403  SendOverlayResponse();
404  return true;
405  }
406  if (segment_hc_pkt) {
407  SegmentHealthCheckReply();
408  } else {
409  Reply();
410  }
411  return true;
412  }
413 
414  if (ntohl(ad->op_) != AgentDiagPktData::DIAG_REPLY) {
415  return true;
416  }
417  //Reply for a query we sent
418  if (!entry) {
419  return true;
420  }
421  entry->HandleReply(this);
422 
423  if (segment_hc_pkt) {
424  /* No further processing required for Segment Health check packet */
425  return true;
426  }
427 
428  if (entry->GetSeqNo() == entry->GetMaxAttempts()) {
429  DiagEntryOp *op;
430  op = new DiagEntryOp(DiagEntryOp::DEL, entry);
431  entry->diag_table()->Enqueue(op);
432  } else {
433  entry->Retry();
434  }
435 
436  return true;
437 }
438 
439 void DiagPktHandler::TcpHdr(in_addr_t src, uint16_t sport, in_addr_t dst,
440  uint16_t dport, bool is_syn, uint32_t seq_no,
441  uint16_t len) {
442  struct tcphdr *tcp = pkt_info_->transp.tcp;
443  tcp->th_sport = htons(sport);
444  tcp->th_dport = htons(dport);
445 
446  if (is_syn) {
447  tcp->th_flags &= ~TH_ACK;
448  } else {
449  //If not sync, by default we are sending an ack
450  tcp->th_flags &= ~TH_SYN;
451  }
452 
453  tcp->th_seq = htons(seq_no);
454  tcp->th_ack = htons(seq_no + 1);
455  //Just a random number;
456  tcp->th_win = htons(1000);
457  tcp->th_off = 5;
458  tcp->th_sum = 0;
459  tcp->th_sum = TcpCsum(src, dst, len, tcp);
460 }
461 
462 void DiagPktHandler::TcpHdr(uint16_t len, const uint8_t *src, uint16_t sport,
463  const uint8_t *dest, uint16_t dport, bool is_syn,
464  uint32_t seq_no, uint8_t next_hdr){
465  struct tcphdr *tcp = pkt_info_->transp.tcp;
466  tcp->th_sport = htons(sport);
467  tcp->th_dport = htons(dport);
468 
469  if (is_syn) {
470  tcp->th_flags &= ~TH_ACK;
471  } else {
472  //If not sync, by default we are sending an ack
473  tcp->th_flags &= ~TH_SYN;
474  }
475 
476  tcp->th_seq = htons(seq_no);
477  tcp->th_ack = htons(seq_no + 1);
478  //Just a random number;
479  tcp->th_win = htons(1000);
480  tcp->th_off = 5;
481  tcp->th_sum = 0;
482  tcp->th_sum = Ipv6Csum(src, dest, len, next_hdr, (uint16_t *)tcp);
483 }
484 
485 uint16_t DiagPktHandler::TcpCsum(in_addr_t src, in_addr_t dest, uint16_t len,
486  tcphdr *tcp) {
487  uint32_t sum = 0;
488  PseudoTcpHdr phdr(src, dest, htons(len));
489  sum = Sum((uint16_t *)&phdr, sizeof(PseudoTcpHdr), sum);
490  return Csum((uint16_t *)tcp, len, sum);
491 }
492 
494  if (pkt_info_->ip_proto == IPPROTO_TCP) {
495  tcphdr *tcp = pkt_info_->transp.tcp;
496  TcpHdr(htonl(pkt_info_->ip_daddr.to_v4().to_ulong()),
497  ntohs(tcp->th_dport),
498  htonl(pkt_info_->ip_saddr.to_v4().to_ulong()),
499  ntohs(tcp->th_sport), false, ntohs(tcp->th_ack),
500  ntohs(pkt_info_->ip->ip_len) - sizeof(struct ip));
501  } else if (pkt_info_->ip_proto == IPPROTO_UDP) {
502  udphdr *udp = pkt_info_->transp.udp;
503  UdpHdr(ntohs(udp->uh_ulen), pkt_info_->ip_daddr.to_v4().to_ulong(),
504  ntohs(udp->uh_dport), pkt_info_->ip_saddr.to_v4().to_ulong(),
505  ntohs(udp->uh_sport));
506  } else if (pkt_info_->ip_proto == IPPROTO_ICMP) {
507  struct icmp *hdr = (struct icmp *) (pkt_info_->transp.icmp);
508  if (hdr->icmp_type == ICMP_ECHO) {
509  hdr->icmp_type = ICMP_ECHOREPLY;
510  hdr->icmp_code = 0;
511  }
512  /* We do not change sequence and identifier fields of ICMP header */
513  }
514 }
515 
517  if (pkt_info_->ip_proto == IPPROTO_TCP) {
518  tcphdr *tcp = pkt_info_->transp.tcp;
519  TcpHdr(ntohs(pkt_info_->ip6->ip6_ctlun.ip6_un1.ip6_un1_plen) - sizeof(struct ip6_hdr),
520  pkt_info_->ip_daddr.to_v6().to_bytes().data(), ntohs(tcp->th_dport),
521  pkt_info_->ip_saddr.to_v6().to_bytes().data(), ntohs(tcp->th_sport),
522  false, ntohs(tcp->th_ack), IPPROTO_TCP);
523  } else if (pkt_info_->ip_proto == IPPROTO_UDP) {
524  udphdr *udp = pkt_info_->transp.udp;
525  UdpHdr(ntohs(udp->uh_ulen), pkt_info_->ip_daddr.to_v6().to_bytes().data(),
526  ntohs(udp->uh_dport), pkt_info_->ip_saddr.to_v6().to_bytes().data(),
527  ntohs(udp->uh_sport), IPPROTO_UDP);
528  }
529 }
530 
532  //IpHdr expects IP address to be in network format
533  struct ip *ip = pkt_info_->ip;
534  IpHdr(ntohs(ip->ip_len), ip->ip_dst.s_addr,
535  ip->ip_src.s_addr, ip->ip_p, DEFAULT_IP_ID, DEFAULT_IP_TTL);
536 }
537 
539  //Ip6Hdr expects IPv6 address to be in network format
540  struct ip6_hdr *ip6 = pkt_info_->ip6;
541  Ip6Hdr(ip6, ntohl(ip6->ip6_ctlun.ip6_un1.ip6_un1_plen),
542  ip6->ip6_ctlun.ip6_un1.ip6_un1_nxt, DEFAULT_IP_TTL,
543  pkt_info_->ip_daddr.to_v6().to_bytes().data(),
544  pkt_info_->ip_saddr.to_v6().to_bytes().data());
545 }
546 
548  struct ether_header *eth = pkt_info_->eth;
549  EthHdr(MacAddress(eth->ether_dhost), MacAddress(eth->ether_shost), ntohs(eth->ether_type));
550 }
551 
553  if (pkt_info_->ether_type == ETHERTYPE_IPV6) {
554  Swapv6L4();
555  SwapIp6Hdr();
556  } else {
557  SwapL4();
558  SwapIpHdr();
559  }
560  SwapEthHdr();
561 }
562 
565 
566  uint16_t type = ntohs(oamdata->oamtlv_.type_);
567  if (type != OamTlv::VXLAN_PING_IPv4 && type != OamTlv::VXLAN_PING_IPv6) {
568  return;
569  }
570 
571  const int tlv_length = ntohs(oamdata->oamtlv_.length_);
572  // VXLAN VNI and IPv4 / IPv6 sender address
573  int parsed_tlv = (type == OamTlv::VXLAN_PING_IPv4) ? 8 : 20;
574 
575  VxLanId *vxlan =
576  Agent::GetInstance()->vxlan_table()->Find(pkt_info_->tunnel.vxlan_id);
577  if (!vxlan) {
578  return;
579  }
580 
581  const VrfNH *vrf_nh = dynamic_cast<const VrfNH *> (vxlan->nexthop());
582  if (!vrf_nh) {
583  return;
584  }
585 
586  const VrfEntry *vrf = vrf_nh->GetVrf();
587  if (!vrf || vrf->IsDeleted()) {
588  return;
589  }
590 
592  while (tlv_length - parsed_tlv >= (int) sizeof(SubTlv)) {
593  SubTlv *subtlv = (SubTlv *) (oamdata->oamtlv_.data_ + parsed_tlv);
594  parsed_tlv += sizeof(SubTlv);
595 
596  const int subtlv_length = ntohs(subtlv->length_);
597  if (ntohs(subtlv->type_) != SubTlv::END_SYSTEM_MAC) {
598  parsed_tlv += subtlv_length;
599  continue;
600  }
601 
602  int parsed_subtlv = 0;
603  // check that we have bytes for MAC (6) and return code (2)
604  while (subtlv_length - parsed_subtlv >=
605  (int) sizeof(SubTlv::EndSystemMac)) {
606  SubTlv::EndSystemMac *end_system_mac =
608  (oamdata->oamtlv_.data_ + parsed_tlv + parsed_subtlv);
609  MacAddress mac(end_system_mac->mac);
610  BridgeAgentRouteTable *table =
611  static_cast<BridgeAgentRouteTable *> (vrf->GetBridgeRouteTable());
612  if (table->FindRoute(mac, Peer::EVPN_PEER) != NULL ||
613  table->FindRoute(mac, Peer::LOCAL_VM_PORT_PEER) != NULL ||
614  table->FindRoute(mac, Peer::LOCAL_VM_PEER) != NULL) {
615  end_system_mac->return_code = htons(SubTlv::END_SYSTEM_PRESENT);
616  } else {
617  end_system_mac->return_code =
619  }
620  parsed_subtlv += sizeof(SubTlv::EndSystemMac);
621  }
622  parsed_tlv += subtlv_length;
623  }
624 }
625 
627  struct ether_header *eth = pkt_info_->tunnel.eth;
628  EthHdr((char *)eth, sizeof(struct ether_header), MacAddress(eth->ether_dhost),
629  MacAddress(eth->ether_shost), ntohs(eth->ether_type),
631  struct ip *ip = pkt_info_->tunnel.ip;
632  IpHdr((char *)ip, sizeof(struct ip), ntohs(ip->ip_len),ip->ip_dst.s_addr,
633  ip->ip_src.s_addr, ip->ip_p, DEFAULT_IP_ID, DEFAULT_IP_TTL);
634 }
635 
637  Agent *agent = Agent::GetInstance();
638  TunnelHdrSwap();
639 
640  OverlayOamPktData *oamdata = (OverlayOamPktData *) pkt_info_->data;
641  if (oamdata->reply_mode_ == OverlayOamPktData::DONT_REPLY) {
642  return ;
643  }
644 
645  SetReturnCode(oamdata);
646 
648  boost::posix_time::ptime
649  epoch(boost::gregorian::date(1970, boost::gregorian::Jan, 1));
650  boost::posix_time::ptime time = microsec_clock::universal_time();
651  boost::posix_time::time_duration td = time - epoch;
652  oamdata->timerecv_sec_ = htonl(td.total_seconds());
653  oamdata->timerecv_misec_ = htonl(td.total_microseconds() -
654  (td.total_seconds()*1000000));
655 
657  Interface *intf = static_cast<Interface *>
658  (agent->interface_table()->Find(&key1, true));
659  Send(intf->id(), agent->fabric_vrf()->vrf_id(),
660  AgentHdr::TX_SWITCH, CMD_PARAM_PACKET_CTRL,
661  CMD_PARAM_1_DIAG, PktHandler::DIAG);
662 }
uint16_t length_
Definition: diag.h:170
uint32_t GetMaxAttempts()
Definition: diag.h:42
#define DEFAULT_IP_TTL
Definition: pkt_handler.h:44
void SendTimeExceededV6Packet()
static Agent * GetInstance()
Definition: agent.h:436
Definition: vrf.h:86
uint32_t timerecv_sec_
Definition: diag.h:206
VrfEntry * fabric_vrf() const
Definition: agent.h:915
static const uint32_t kVxlanRABit
Definition: overlay_ping.h:21
const VrfEntry * GetVrf() const
Definition: nexthop.h:1444
const VnIpam * GetIpam(const IpAddress &ip) const
Definition: vn.cc:651
Definition: vn.h:28
bool IsDeleted() const
Definition: db_entry.h:49
#define DEFAULT_IP_ID
Definition: pkt_handler.h:48
uint8_t return_code_
Definition: diag.h:200
uint32_t op_
Definition: diag.h:82
InterfaceTable * interface_table() const
Definition: agent.h:465
uint32_t timerecv_misec_
Definition: diag.h:207
Definition: vxlan.h:14
uint16_t return_code
Definition: diag.h:174
uint16_t DiagKey
Definition: diag.h:23
BridgeRouteEntry * FindRoute(const MacAddress &mac)
Definition: bridge_route.cc:72
#define VXLAN_UDP_DEST_PORT
Definition: pkt_handler.h:36
void SendTimeExceededPacket()
uint8_t type
Definition: load_balance.h:109
IpAddress default_gw
Definition: vn.h:31
static const uint32_t kInvalidVlanId
Definition: vm_interface.h:360
Definition: agent.h:358
uint32_t GetSeqNo()
Definition: diag.h:41
uint32_t org_handle_
Definition: diag.h:202
const std::string & fabric_interface_name() const
Definition: agent.h:1129
void SegmentHealthCheckReply()
DiagEntry::DiagKey key_
Definition: diag.h:83
bool layer3_forwarding() const
AgentRouteTable * GetBridgeRouteTable() const
Definition: vrf.cc:334
uint16_t TcpCsum(in_addr_t, in_addr_t, uint16_t, tcphdr *)
uint8_t mac[6]
Definition: diag.h:173
virtual void HandleReply(DiagPktHandler *handler)=0
const VnEntry * vn() const
AgentDBEntry * Find(const DBEntry *key, bool ret_del)
Definition: agent_db.cc:134
const uint32_t vrf_id() const
Definition: vrf.h:99
uint16_t type_
Definition: diag.h:169
void TcpHdr(in_addr_t, uint16_t, in_addr_t, uint16_t, bool, uint32_t, uint16_t)
DiagTable * diag_table() const
Definition: diag.h:48
boost::asio::ip::address_v4 Ip4Address
Definition: address.h:14
const NextHop * nexthop() const
Definition: vxlan.h:28
void SetReturnCode(OverlayOamPktData *oamdata)
Definition: diag.h:155
bool IsOverlayPingPacket()
bool HandleTraceRoutePacket()
char data_[1]
Definition: diag.h:152
#define ICMP_UNREACH_HDR_LEN
Definition: pkt_handler.h:51
uint32_t reserved
Definition: pkt_handler.h:91
VxLanId * Find(uint32_t vxlan_id)
Definition: vxlan.cc:223
uint8_t msg_type_
Definition: diag.h:198
VxLanTable * vxlan_table() const
Definition: agent.h:535
bool ParseIcmpData(const uint8_t *data, uint16_t data_len, uint16_t *key, bool is_v4)
bool HandleTraceRouteResponse()
uint16_t length_
Definition: diag.h:151
void Enqueue(DiagEntryOp *op)
Definition: diag.cc:159
Definition: diag.h:21
OamTlv oamtlv_
Definition: diag.h:208
#define IPV6_ICMP_NEXT_HEADER
virtual bool Run()
uint8_t reply_mode_
Definition: diag.h:199
virtual void Retry()
Definition: diag.cc:84
uint16_t type_
Definition: diag.h:150