FD.io VPP
v16.12-rc0-308-g931be3a
Vector Packet Processing
Main Page
Related Pages
Data Structures
Source
Files
Symbols
FD.io VPP
Vector Packet Processing
Release Notes
Debug CLI
Startup Configuration
Todo List
Node Identifiers
Data Structures
Source
Files
Symbols
•
All
Data Structures
Files
Functions
Variables
Typedefs
Enumerations
Enumerator
Macros
Pages
fib.h
Go to the documentation of this file.
1
/*
2
* Copyright (c) 2016 Cisco and/or its affiliates.
3
* Licensed under the Apache License, Version 2.0 (the "License");
4
* you may not use this file except in compliance with the License.
5
* You may obtain a copy of the License at:
6
*
7
* http://www.apache.org/licenses/LICENSE-2.0
8
*
9
* Unless required by applicable law or agreed to in writing, software
10
* distributed under the License is distributed on an "AS IS" BASIS,
11
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
* See the License for the specific language governing permissions and
13
* limitations under the License.
14
*/
15
/**
16
* \brief
17
* A IP v4/6 independent FIB.
18
*
19
* The main functions provided by the FIB are as follows;
20
*
21
* - source priorities
22
*
23
* A route can be added to the FIB by more than entity or source. Sources
24
* include, but are not limited to, API, CLI, LISP, MAP, etc (for the full list
25
* see fib_entry.h). Each source provides the forwarding information (FI) that
26
* is has determined as required for that route. Since each source determines the
27
* FI using different best path and loop prevention algorithms, it is not
28
* correct for the FI of multiple sources to be combined. Instead the FIB must
29
* choose to use the FI from only one source. This choose is based on a static
30
* priority assignment. For example;
31
* IF a prefix is added as a result of interface configuration:
32
* set interface address 192.168.1.1/24 GigE0
33
* and then it is also added from the CLI
34
* ip route 192.168.1.1/32 via 2.2.2.2/32
35
* then the 'interface' source will prevail, and the route will remain as
36
* 'local'.
37
* The requirement of the FIB is to always install the FI from the winning
38
* source and thus to maintain the FI added by losing sources so it can be
39
* installed should the winning source be withdrawn.
40
*
41
* - adj-fib maintenance
42
*
43
* When ARP or ND discover a neighbour on a link an adjacency forms for the
44
* address of that neighbour. It is also required to insert a route in the
45
* appropriate FIB table, corresponding to the VRF for the link, an entry for
46
* that neighbour. This entry is often referred to as an adj-fib. Adj-fibs
47
* have a dedicated source; 'ADJ'.
48
* The priority of the ADJ source is lower than most. This is so the following
49
* config;
50
* set interface address 192.168.1.1/32 GigE0
51
* ip arp 192.168.1.2 GigE0 dead.dead.dead
52
* ip route add 192.168.1.2 via 10.10.10.10 GigE1
53
* will forward traffic for 192.168.1.2 via GigE1. That is the route added
54
* by the control plane is favoured over the adjacency discovered by ARP.
55
* The control plane, with its associated authentication, is considered the
56
* authoritative source.
57
* To counter the nefarious addition of adj-fib, through the nefarious injection
58
* of adjacencies, the FIB is also required to ensure that only adj-fibs whose
59
* less specific covering prefix is connected are installed in forwarding. This
60
* requires the use of 'cover tracking', where a route maintains a dependency
61
* relationship with the route that is its less specific cover. When this cover
62
* changes (i.e. there is a new covering route) or the forwarding information
63
* of the cover changes, then the covered route is notified.
64
*
65
* Overlapping sub-nets are not supported, so no adj-fib has multiple paths.
66
* The control plane is expected to remove a prefix configured for an interface
67
* before the interface changes VRF.
68
* So while the following config is accepted:
69
* set interface address 192.168.1.1/32 GigE0
70
* ip arp 192.168.1.2 GigE0 dead.dead.dead
71
* set interface ip table GigE0 2
72
* it does not result in the desired behaviour.
73
*
74
* - attached export.
75
*
76
* Further to adj-fib maintenance above consider the following config:
77
* set interface address 192.168.1.1/24 GigE0
78
* ip route add table 2 192.168.1.0/24 GigE0
79
* Traffic destined for 192.168.1.2 in table 2 will generate an ARP request
80
* on GigE0. However, since GigE0 is in table 0, all adj-fibs will be added in
81
* FIB 0. Hence all hosts in the sub-net are unreachable from table 2. To resolve
82
* this, all adj-fib and local prefixes are exported (i.e. copied) from the
83
* 'export' table 0, to the 'import' table 2. There can be many import tables
84
* for a single export table.
85
*
86
* - recursive route resolution
87
*
88
* A recursive route is of the form:
89
* 1.1.1.1/32 via 10.10.10.10
90
* i.e. a route for which no egress interface is provided. In order to forward
91
* traffic to 1.1.1.1/32 the FIB must therefore first determine how to forward
92
* traffic to 10.10.10.10/32. This is recursive resolution.
93
* Recursive resolution, just like normal resolution, proceeds via a longest
94
* prefix match for the 'via-address' 10.10.10.10. Note it is only possible
95
* to add routes via an address (i.e. a /32 or /128) not via a shorter mask
96
* prefix. There is no use case for the latter.
97
* Since recursive resolution proceeds via a longest prefix match, the entry
98
* in the FIB that will resolve the recursive route, termed the via-entry, may
99
* change as other routes are added to the FIB. Consider the recursive
100
* route shown above, and this non-recursive route:
101
* 10.10.10.0/24 via 192.168.16.1 GigE0
102
* The entry for 10.10.10.0/24 is thus the resolving via-entry. If this entry is
103
* modified, to say;
104
* 10.10.10.0/24 via 192.16.1.3 GigE0
105
* Then packet for 1.1.1.1/32 must also be sent to the new next-hop.
106
* Now consider the addition of;
107
* 10.10.10.0/28 via 192.168.16.2 GigE0
108
* The more specific /28 is a better longest prefix match and thus becomes the
109
* via-entry. Removal of the /28 means the resolution will revert to the /24.
110
* The tracking to the changes in recursive resolution is the requirement of
111
* the FIB. When the forwarding information of the via-entry changes a back-walk
112
* is used to update dependent recursive routes. When new routes are added to
113
* the table the cover tracking feature provides the necessary notifications to
114
* the via-entry routes.
115
* The adjacency constructed for 1.1.1.1/32 will be a recursive adjacency
116
* whose next adjacency will be contributed from the via-entry. Maintaining
117
* the validity of this recursive adjacency is a requirement of the FIB.
118
*
119
* - recursive loop avoidance
120
*
121
* Consider this set of routes:
122
* 1.1.1.1/32 via 2.2.2.2
123
* 2.2.2.2/32 via 3.3.3.3
124
* 3.3.3.3/32 via 1.1.1.1
125
* this is termed a recursion loop - all of the routes in the loop are
126
* unresolved in so far as they do not have a resolving adjacency, but each
127
* is resolved because the via-entry is known. It is important here to note
128
* the distinction between the control-plane objects and the data-plane objects
129
* (more details in the implementation section). The control plane objects must
130
* allow the loop to form (i.e. the graph becomes cyclic), however, the
131
* data-plane absolutely must not allow the loop to form, otherwise the packet
132
* would loop indefinitely and never egress the device - meltdown would follow.
133
* The control plane must allow the loop to form, because when the loop breaks,
134
* all members of the loop need to be updated. Forming the loop allows the
135
* dependencies to be correctly setup to allow this to happen.
136
* There is no limit to the depth of recursion supported by VPP so:
137
* 9.9.9.100/32 via 9.9.9.99
138
* 9.9.9.99/32 via 9.9.9.98
139
* 9.9.9.98/32 via 9.9.9.97
140
* ... turtles, turtles, turtles ...
141
* 9.9.9.1/32 via 10.10.10.10 Gig0
142
* is supported to as many layers of turtles is desired, however, when
143
* back-walking a graph (in this case from 9.9.9.1/32 up toward 9.9.9.100/32)
144
* a FIB needs to differentiate the case where the recursion is deep versus
145
* the case where the recursion is looped. A simple method, employed by VPP FIB,
146
* is to limit the number of steps. VPP FIB limit is 16. Typical BGP scenarios
147
* in the wild do not exceed 3 (BGP Inter-AS option C).
148
*
149
* - Fast Convergence
150
*
151
* After a network topology change, the 'convergence' time, is the time taken
152
* for the router to complete a transition to forward traffic using the new
153
* topology. The convergence time is therefore a summation of the time to;
154
* - detect the failure.
155
* - calculate the new 'best path' information
156
* - download the new best paths to the data-plane.
157
* - install those best best in data-plane forwarding.
158
* The last two points are of relevance to VPP architecture. The download API is
159
* binary and batch, details are not discussed here. There is no HW component to
160
* programme, installation time is bounded by the memory allocation and table
161
* lookup and insert access times.
162
*
163
* 'Fast' convergence refers to a set of technologies that a FIB can employ to
164
* completely or partially restore forwarding whilst the convergence actions
165
* listed above are ongoing. Fast convergence technologies are further
166
* sub-divided into Prefix Independent Convergence (PIC) and Loop Free
167
* Alternate path Fast re-route (LFA-FRR or sometimes called IP-FRR) which
168
* affect recursive and non-recursive routes respectively.
169
*
170
* LFA-FRR
171
*
172
* Consider the network topology below:
173
*
174
* C
175
* / \
176
* X -- A --- B - Y
177
* | |
178
* D F
179
* \ /
180
* E
181
*
182
* all links are equal cost, traffic is passing from X to Y. the best path is
183
* X-A-B-Y. There are two alternative paths, one via C and one via E. An
184
* alternate path is considered to be loop free if no other router on that path
185
* would forward the traffic back to the sender. Consider router C, its best
186
* path to Y is via B, so if A were to send traffic destined to Y to C, then C
187
* would forward that traffic to B - this is a loop-free alternate path. In
188
* contrast consider router D. D's shortest path to Y is via A, so if A were to
189
* send traffic destined to Y via D, then D would send it back to A; this is
190
* not a loop-free alternate path. There are several points of note;
191
* - we are considering the pre-failure routing topology
192
* - any equal-cost multi-path between A and B is also a LFA path.
193
* - in order for A to calculate LFA paths it must be aware of the best-path
194
* to Y from the perspective of D. These calculations are thus limited to
195
* routing protocols that have a full view of the network topology, i.e.
196
* link-state DB protocols like OSPF or an SDN controller. LFA protected
197
* prefixes are thus non-recursive.
198
*
199
* LFA is specified as a 1 to 1 redundancy; a primary path has only one LFA
200
* (a.k.a. backup) path. To my knowledge this limitation is one of complexity
201
* in the calculation of and capacity planning using a 1-n redundancy.
202
*
203
* In the event that the link A-B fails, the alternate path via C can be used.
204
* In order to provide 'fast' failover in the event of a failure, the control
205
* plane will download both the primary and the backup path to the FIB. It is
206
* then a requirement of the FIB to perform the failover (a.k.a cutover) from
207
* the primary to the backup path as quickly as possible, and particularly
208
* without any other control-plane intervention. The expectation is cutover is
209
* less than 50 milli-seconds - a value allegedly from the VOIP QoS. Note that
210
* cutover time still includes the fault detection time, which in a vitalised
211
* environment could be the dominant factor. Failure detection can be either a
212
* link down, which will affect multiple paths on a multi-access interface, or
213
* via a specific path heartbeat (i.e. BFD).
214
* At this time VPP does not support LFA, that is it does not support the
215
* installation of a primary and backup path[s] for a route. However, it does
216
* support ECMP, and VPP FIB is designed to quickly remove failed paths from
217
* the ECMP set, however, it does not insert shared objects specific to the
218
* protected resource into the forwarding object graph, since this would incur
219
* a forwarding/performance cost. Failover time is thus route number dependent.
220
* Details are provided in the implementation section below.
221
*
222
* PIC
223
*
224
* PIC refers to the concept that the converge time should be independent of
225
* the number of prefixes/routes that are affected by the failure. PIC is
226
* therefore most appropriate when considering networks with large number of
227
* prefixes, i.e. BGP networks and thus recursive prefixes. There are several
228
* flavours of PIC covering different locations of protection and failure
229
* scenarios. An outline is given below, see the literature for more details:
230
*
231
* Y/16 - CE1 -- PE1---\
232
* | \ P1---\
233
* | \ PE3 -- CE3 - X/16
234
* | - P2---/
235
* Y/16 - CE2 -- PE2---/
236
*
237
* CE = customer edge, PE = provider edge. external-BGP runs between customer
238
* and provider, internal-BGP runs between provider and provider.
239
*
240
* 1) iBGP PIC-core: consider traffic from CE1 to X/16 via CE3. On PE1 there is
241
* are routes;
242
* X/16 (and hundreds of thousands of others like it)
243
* via PE3
244
* and
245
* PE3/32 (its loopback address)
246
* via 10.0.0.1 Link0 (this is P1)
247
* via 10.1.1.1 Link1 (this is P2)
248
* the failure is the loss of link0 or link1
249
* As in all PIC scenarios, in order to provide prefix independent convergence
250
* it must be that the route for X/16 (and all other routes via PE3) do not
251
* need to be updated in the FIB. The FIB therefore needs to update a single
252
* object that is shared by all routes - once this shared object is updated,
253
* then all routes using it will be instantly updated to use the new forwarding
254
* information. In this case the shared object is the resolving route via PE3.
255
* Once the route via PE3 is updated via IGP (OSPF) convergence, then all
256
* recursive routes that resolve through it are also updated. VPP FIB
257
* implements this scenario via a recursive-adjacency. the X/16 and it sibling
258
* routes share a recursive-adjacency that links to/points at/stacks on the
259
* normal adjacency contributed by the route for PE3. Once this shared
260
* recursive adj is re-linked then all routes are switched to using the new
261
* forwarding information. This is shown below;
262
*
263
* pre-failure;
264
* X/16 --> R-ADJ-1 --> ADJ-1-PE3 (multi-path via P1 and P2)
265
*
266
* post-failure:
267
* X/16 --> R-ADJ-1 --> ADJ-2-PE3 (single path via P1)
268
*
269
* note that R-ADJ-1 (the recursive adj) remains in the forwarding graph,
270
* therefore X/16 (and all its siblings) is not updated.
271
* X/16 and its siblings share the recursive adj since they share the same
272
* path-list. It is the path-list object that contributes the recursive-adj
273
* (see next section for more details)
274
*
275
*
276
* 2) iBGP PIC-edge; Traffic from CE3 to Y/16. On PE3 there is are routes;
277
* Y/16 (and hundreds of thousands of others like it)
278
* via PE1
279
* via PE2
280
* and
281
* PE1/32 (PE1's loopback address)
282
* via 10.0.2.2 Link0 (this is P1)
283
* PE2/32 (PE2's loopback address)
284
* via 10.0.3.3 Link1 (this is P2)
285
*
286
* the failure is the loss of reachability to PE2. this could be either the
287
* loss of the link P2-PE2 or the loss of the node PE2. This is detected either
288
* by the withdrawal of the PE2's loopback route or by some form of failure
289
* detection (i.e. BFD).
290
* VPP FIB again provides PIC via the use of the shared recursive-adj. Y/16 and
291
* its siblings will again share a path-list for the list {PE1,PE2}, this
292
* path-list will contribute a multi-path-recursive-adj, i.e. a multi-path-adj
293
* with each choice therein being another adj;
294
*
295
* Y/16 -> RM-ADJ --> ADJ1 (for PE1)
296
* --> ADJ2 (for PE2)
297
*
298
* when the route for PE1 is withdrawn then the multi-path-recursive-adjacency
299
* is updated to be;
300
*
301
* Y/16 --> RM-ADJ --> ADJ1 (for PE1)
302
* --> ADJ1 (for PE1)
303
*
304
* that is both choices in the ECMP set are the same and thus all traffic is
305
* forwarded to PE1. Eventually the control plane will download a route update
306
* for Y/16 to be via PE1 only. At that time the situation will be:
307
*
308
* Y/16 -> R-ADJ --> ADJ1 (for PE1)
309
*
310
* In the scenario above we assumed that PE1 and PE2 are ECMP for Y/16. eBGP
311
* PIC core is also specified for the case were one PE is primary and the other
312
* backup - VPP FIB does not support that case at this time.
313
*
314
* 3) eBGP PIC Edge; Traffic from CE3 to Y/16. On PE1 there is are routes;
315
* Y/16 (and hundreds of thousands of others like it)
316
* via CE1 (primary)
317
* via PE2 (backup)
318
* and
319
* CE1 (this is an adj-fib)
320
* via 11.0.0.1 Link0 (this is CE1) << this is an adj-fib
321
* PE2 (PE2's loopback address)
322
* via 10.0.5.5 Link1 (this is link PE1-PE2)
323
* the failure is the loss of link0 to CE1. The failure can be detected by FIB
324
* either as a link down event or by the control plane withdrawing the connected
325
* prefix on the link0 (say 10.0.5.4/30). The latter works because the resolving
326
* entry is an adj-fib, so removing the connected will withdraw the adj-fib, and
327
* hence the recursive path becomes unresolved. The former is faster,
328
* particularly in the case of Inter-AS option A where there are many VLAN
329
* sub-interfaces on the PE-CE link, one for each VRF, and so the control plane
330
* must remove the connected prefix for each sub-interface to trigger PIC in
331
* each VRF. Note though that total PIC cutover time will depend on VRF scale
332
* with either trigger.
333
* Primary and backup paths in this eBGP PIC-edge scenario are calculated by
334
* BGP. Each peer is configured to always advertise its best external path to
335
* its iBGP peers. Backup paths therefore send traffic from the PE back into the
336
* core to an alternate PE. A PE may have multiple external paths, i.e. multiple
337
* directly connected CEs, it may also have multiple backup PEs, however there
338
* is no correlation between the two, so unlike LFA-FRR, the redundancy model is
339
* N-M; N primary paths are backed-up by M backup paths - only when all primary
340
* paths fail, then the cutover is performed onto the M backup paths. Note that
341
* PE2 must be suitably configured to forward traffic on its external path that
342
* was received from PE1. VPP FIB does not support external-internal-BGP (eiBGP)
343
* load-balancing.
344
*
345
* As with LFA-FRR the use of primary and backup paths is not currently
346
* supported, however, the use of a recursive-multi-path-adj, and a suitably
347
* constrained hashing algorithm to choose from the primary or backup path sets,
348
* would again provide the necessary shared object and hence the prefix scale
349
* independent cutover.
350
*
351
* Astute readers will recognise that both of the eBGP PIC scenarios refer only
352
* to a BGP free core.
353
*
354
* Fast convergence implementation options come in two flavours:
355
* 1) Insert switches into the data-path. The switch represents the protected
356
* resource. If the switch is 'on' the primary path is taken, otherwise
357
* the backup path is taken. Testing the switch in the data-path comes with
358
* an associated performance cost. A given packet may encounter more than
359
* one protected resource as it is forwarded. This approach minimises
360
* cutover times as packets will be forwarded on the backup path as soon
361
* as the protected resource is detected to be down and the single switch
362
* is tripped. However, it comes at a performance cost, which increases
363
* with each shared resource a packet encounters in the data-path.
364
* This approach is thus best suited to LFA-FRR where the protected routes
365
* are non-recursive (i.e. encounter few shared resources) and the
366
* expectation on cutover times is more stringent (<50msecs).
367
* 2) Update shared objects. Identify objects in the data-path, that are
368
* required to be present whether or not fast convergence is required (i.e.
369
* adjacencies) that can be shared by multiple routes. Create a dependency
370
* between these objects at the protected resource. When the protected
371
* resource fails, each of the shared objects is updated in a way that all
372
* users of it see a consistent change. This approach incurs no performance
373
* penalty as the data-path structure is unchanged, however, the cutover
374
* times are longer as more work is required when the resource fails. This
375
* scheme is thus more appropriate to recursive prefixes (where the packet
376
* will encounter multiple protected resources) and to fast-convergence
377
* technologies where the cutover times are less stringent (i.e. PIC).
378
*
379
* Implementation:
380
* ---------------
381
*
382
* Due to the requirements outlined above, not all routes known to FIB
383
* (e.g. adj-fibs) are installed in forwarding. However, should circumstances
384
* change, those routes will need to be added. This adds the requirement that
385
* a FIB maintains two tables per-VRF, per-AF (where a 'table' is indexed by
386
* prefix); the forwarding and non-forwarding tables.
387
*
388
* For DP speed in VPP we want the lookup in the forwarding table to directly
389
* result in the ADJ. So the two tables; one contains all the routes (a
390
* lookup therein yields a fib_entry_t), the other contains only the forwarding
391
* routes (a lookup therein yields an ip_adjacency_t). The latter is used by the
392
* DP.
393
* This trades memory for forwarding performance. A good trade-off in VPP's
394
* expected operating environments.
395
*
396
* Note these tables are keyed only by the prefix (and since there 2 two
397
* per-VRF, implicitly by the VRF too). The key for an adjacency is the
398
* tuple:{next-hop, address (and it's AF), interface, link/ether-type}.
399
* consider this curious, but allowed, config;
400
*
401
* set int ip addr 10.0.0.1/24 Gig0
402
* set ip arp Gig0 10.0.0.2 dead.dead.dead
403
* # a host in that sub-net is routed via a better next hop (say it avoids a
404
* # big L2 domain)
405
* ip route add 10.0.0.2 Gig1 192.168.1.1
406
* # this recursive should go via Gig1
407
* ip route add 1.1.1.1/32 via 10.0.0.2
408
* # this non-recursive should go via Gig0
409
* ip route add 2.2.2.2/32 via Gig0 10.0.0.2
410
*
411
* for the last route, the lookup for the path (via {Gig0, 10.0.0.2}) in the
412
* prefix table would not yield the correct result. To fix this we need a
413
* separate table for the adjacencies.
414
*
415
* - FIB data structures;
416
*
417
* fib_entry_t:
418
* - a representation of a route.
419
* - has a prefix.
420
* - it maintains an array of path-lists that have been contributed by the
421
* different sources
422
* - install an adjacency in the forwarding table contributed by the best
423
* source's path-list.
424
*
425
* fib_path_list_t:
426
* - a list of paths
427
* - path-lists may be shared between FIB entries. The path-lists are thus
428
* kept in a DB. The key is the combined description of the paths. We share
429
* path-lists when it will aid convergence to do so. Adding path-lists to
430
* this DB that are never shared, or are not shared by prefixes that are
431
* not subject to PIC, will increase the size of the DB unnecessarily and
432
* may lead to increased search times due to hash collisions.
433
* - the path-list contributes the appropriate adj for the entry in the
434
* forwarding table. The adj can be 'normal', multi-path or recursive,
435
* depending on the number of paths and their types.
436
* - since path-lists are shared there is only one instance of the multi-path
437
* adj that they [may] create. As such multi-path adjacencies do not need a
438
* separate DB.
439
* The path-list with recursive paths and the recursive adjacency that it
440
* contributes forms the backbone of the fast convergence architecture (as
441
* described previously).
442
*
443
* fib_path_t:
444
* - a description of how to forward the traffic (i.e. via {Gig1, K}).
445
* - the path describes the intent on how to forward. This differs from how
446
* the path resolves. I.e. it might not be resolved at all (since the
447
* interface is deleted or down).
448
* - paths have different types, most notably recursive or non-recursive.
449
* - a fib_path_t will contribute the appropriate adjacency object. It is from
450
* these contributions that the DP graph/chain for the route is built.
451
* - if the path is recursive and a recursion loop is detected, then the path
452
* will contribute the special DROP adjacency. This way, whilst the control
453
* plane graph is looped, the data-plane graph does not.
454
*
455
* we build a graph of these objects;
456
*
457
* fib_entry_t -> fib_path_list_t -> fib_path_t -> ...
458
*
459
* for recursive paths:
460
*
461
* fib_path_t -> fib_entry_t -> ....
462
*
463
* for non-recursive paths
464
*
465
* fib_path_t -> ip_adjacency_t -> interface
466
*
467
* These objects, which constitute the 'control plane' part of the FIB are used
468
* to represent the resolution of a route. As a whole this is referred to as the
469
* control plane graph. There is a separate DP graph to represent the forwarding
470
* of a packet. In the DP graph each object represents an action that is applied
471
* to a packet as it traverses the graph. For example, a lookup of a IP address
472
* in the forwarding table could result in the following graph:
473
*
474
* recursive-adj --> multi-path-adj --> interface_A
475
* --> interface_B
476
*
477
* A packet traversing this FIB DP graph would thus also traverse a VPP node
478
* graph of:
479
*
480
* ipX_recursive --> ipX_rewrite --> interface_A_tx --> etc
481
*
482
* The taxonomy of objects in a FIB graph is as follows, consider;
483
*
484
* A -->
485
* B --> D
486
* C -->
487
*
488
* Where A,B and C are (for example) routes that resolve through D.
489
* parent; D is the parent of A, B, and C.
490
* children: A, B, and C are children of D.
491
* sibling: A, B and C are siblings of one another.
492
*
493
* All shared objects in the FIB are reference counted. Users of these objects
494
* are thus expected to use the add_lock/unlock semantics (as one would
495
* normally use malloc/free).
496
*
497
* WALKS
498
*
499
* It is necessary to walk/traverse the graph forwards (entry to interface) to
500
* perform a collapse or build a recursive adj and backwards (interface
501
* to entry) to perform updates, i.e. when interface state changes or when
502
* recursive route resolution updates occur.
503
* A forward walk follows simply by navigating an object's parent pointer to
504
* access its parent object. For objects with multiple parents (e.g. a
505
* path-list), each parent is walked in turn.
506
* To support back-walks direct dependencies are maintained between objects,
507
* i.e. in the relationship, {A, B, C} --> D, then object D will maintain a list
508
* of 'pointers' to its children {A, B, C}. Bare C-language pointers are not
509
* allowed, so a pointer is described in terms of an object type (i.e. entry,
510
* path-list, etc) and index - this allows the object to be retrieved from the
511
* appropriate pool. A list is maintained to achieve fast convergence at scale.
512
* When there are millions or recursive prefixes, it is very inefficient to
513
* blindly walk the tables looking for entries that were affected by a given
514
* topology change. The lowest hanging fruit when optimising is to remove
515
* actions that are not required, so all back-walks only traverse objects that
516
* are directly affected by the change.
517
*
518
* PIC Core and fast-reroute rely on FIB reacting quickly to an interface
519
* state change to update the multi-path-adjacencies that use this interface.
520
* An example graph is shown below:
521
*
522
* E_a -->
523
* E_b --> PL_2 --> P_a --> Interface_A
524
* ... --> P_c -\
525
* E_k --> \
526
* Interface_K
527
* /
528
* E_l --> /
529
* E_m --> PL_1 --> P_d -/
530
* ... --> P_f --> Interface_F
531
* E_z -->
532
*
533
* E = fib_entry_t
534
* PL = fib_path_list_t
535
* P = fib_path_t
536
* The subscripts are arbitrary and serve only to distinguish object instances.
537
* This CP graph result in the following DP graph:
538
*
539
* M-ADJ-2 --> Interface_A
540
* \
541
* -> Interface_K
542
* /
543
* M-ADJ-1 --> Interface_F
544
*
545
* M-ADJ = multi-path-adjacency.
546
*
547
* When interface K goes down a back-walk is started over its dependants in the
548
* control plane graph. This back-walk will reach PL_1 and PL_2 and result in
549
* the calculation of new adjacencies that have interface K removed. The walk
550
* will continue to the entry objects and thus the forwarding table is updated
551
* for each prefix with the new adjacency. The DP graph then becomes:
552
*
553
* ADJ-3 --> Interface_A
554
*
555
* ADJ-4 --> Interface_F
556
*
557
* The eBGP PIC scenarios described above relied on the update of a path-list's
558
* recursive-adjacency to provide the shared point of cutover. This is shown
559
* below
560
*
561
* E_a -->
562
* E_b --> PL_2 --> P_a --> E_44 --> PL_a --> P_b --> Interface_A
563
* ... --> P_c -\
564
* E_k --> \
565
* \
566
* E_1 --> PL_k -> P_k --> Interface_K
567
* /
568
* E_l --> /
569
* E_m --> PL_1 --> P_d -/
570
* ... --> P_f --> E_55 --> PL_e --> P_e --> Interface_E
571
* E_z -->
572
*
573
* The failure scenario is the removal of entry E_1 and thus the paths P_c and
574
* P_d become unresolved. To achieve PIC the two shared recursive path-lists,
575
* PL_1 and PL_2 must be updated to remove E_1 from the recursive-multi-path-
576
* adjacencies that they contribute, before any entry E_a to E_z is updated.
577
* This means that as the update propagates backwards (right to left) in the
578
* graph it must do so breadth first not depth first. Note this approach leads
579
* to convergence times that are dependent on the number of path-list and so
580
* the number of combinations of egress PEs - this is desirable as this
581
* scale is considerably lower than the number of prefixes.
582
*
583
* If we consider another section of the graph that is similar to the one
584
* shown above where there is another prefix E_2 in a similar position to E_1
585
* and so also has many dependent children. It is reasonable to expect that a
586
* particular network failure may simultaneously render E_1 and E_2 unreachable.
587
* This means that the update to withdraw E_2 is download immediately after the
588
* update to withdraw E_1. It is a requirement on the FIB to not spend large
589
* amounts of time in a back-walk whilst processing the update for E_1, i.e. the
590
* back-walk must not reach as far as E_a and its siblings. Therefore, after the
591
* back-walk has traversed one generation (breadth first) to update all the
592
* path-lists it should be suspended/back-ground and further updates allowed
593
* to be handled. Once the update queue is empty, the suspended walks can be
594
* resumed. Note that in the case that multiple updates affect the same entry
595
* (say E_1) then this will trigger multiple similar walks, these are merged,
596
* so each child is updated only once.
597
* In the presence of more layers of recursion PIC is still a desirable
598
* feature. Consider an extension to the diagram above, where more recursive
599
* routes (E_100 -> E_200) are added as children of E_a:
600
*
601
* E_100 -->
602
* E_101 --> PL_3 --> P_j-\
603
* ... \
604
* E_199 --> E_a -->
605
* E_b --> PL_2 --> P_a --> E_44 --> ...etc..
606
* ... --> P_c -\
607
* E_k \
608
* E_1 --> ...etc..
609
* /
610
* E_l --> /
611
* E_m --> PL_1 --> P_d -/
612
* ... --> P_e --> E_55 --> ...etc..
613
* E_z -->
614
*
615
* To achieve PIC for the routes E_100->E_199, PL_3 needs to be updated before
616
* E_b -> E_z, a breadth first traversal at each level would not achieve this.
617
* Instead the walk must proceed intelligently. Children on PL_2 are sorted so
618
* those Entry objects that themselves have children appear first in the list,
619
* those without later. When an entry object is walked that has children, a
620
* walk of its children is pushed to the front background queue. The back
621
* ground queue is a priority queue. As the breadth first traversal proceeds
622
* across the dependent entry object E_a to E_k, when the first entry that does
623
* not have children is reached (E_b), the walk is suspended and placed at the
624
* back of the queue. Following this prioritisation method shared path-list
625
* updates are performed before all non-resolving entry objects.
626
* The CPU/core/thread that handles the updates is the same thread that handles
627
* the back-walks. Handling updates has a higher priority than making walk
628
* progress, so a walk is required to be interruptable/suspendable when new
629
* updates are available.
630
* !!! TODO - this section describes how walks should be not how they are !!!
631
*
632
* In the diagram above E_100 is an IP route, however, VPP has no restrictions
633
* on the type of object that can be a dependent of a FIB entry. Children of
634
* a FIB entry can be (and are) GRE & VXLAN tunnels endpoints, L2VPN LSPs etc.
635
* By including all object types into the graph and extending the back-walk, we
636
* can thus deliver fast convergence to technologies that overlay on an IP
637
* network.
638
*
639
* If having read all the above carefully you are still thinking; 'i don't need
640
* all this %&$* i have a route only I know about and I just need to jam it in',
641
* then fib_table_entry_special_add() is your only friend.
642
*/
643
644
#ifndef __FIB_H__
645
#define __FIB_H__
646
647
#include <
vnet/fib/fib_table.h
>
648
#include <
vnet/fib/fib_entry.h
>
649
#include <
vnet/fib/ip4_fib.h
>
650
#include <
vnet/fib/ip6_fib.h
>
651
652
#endif
ip4_fib.h
ip6_fib.h
fib_entry.h
fib_table.h
vnet
vnet
fib
fib.h
Generated on Thu Nov 3 2016 18:24:35 for FD.io VPP by
1.8.11