// Project Calico BPF dataplane programs.
// Copyright (c) 2020-2022 Tigera, Inc. All rights reserved.
// SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later

#ifndef __CALI_FIB_CO_RE_H__
#define __CALI_FIB_CO_RE_H__

#include "profiling.h"
#ifndef IPVER6
#include "ip_v4_fragment.h"
#endif
#include <linux/if_packet.h>

static CALI_BPF_INLINE int make_room_for_l2_header(struct cali_tc_ctx *ctx)
{
	int rc = bpf_skb_change_head(ctx->skb, ETH_HLEN, 0);
	if (rc < 0) {
		CALI_DEBUG("bpf_skb_change_head failed %d.", rc);
		return rc;
	}
	if (skb_refresh_validate_ptrs(ctx, UDP_SIZE)) {
		CALI_DEBUG("Too short");
		return -1;
	}
#ifdef IPVER6
	eth_hdr(ctx)->h_proto = bpf_htons(ETH_P_IPV6);
#else
	eth_hdr(ctx)->h_proto = bpf_htons(ETH_P_IP);
#endif
	return 0;
}

static CALI_BPF_INLINE int try_redirect_to_peer(struct cali_tc_ctx *ctx)
{
	struct cali_tc_state *state = ctx->state;
	int rc = 0;
	bool redirect_peer = GLOBAL_FLAGS & CALI_GLOBALS_REDIRECT_PEER;
	if (redirect_peer && ct_result_rc(state->ct_result.rc) == CALI_CT_ESTABLISHED_BYPASS &&
			state->ct_result.ifindex_fwd != CT_INVALID_IFINDEX  &&
			!(ctx->state->ct_result.flags & CALI_CT_FLAG_SKIP_REDIR_PEER)) {
		if (CALI_F_L3_DEV) {
			rc = make_room_for_l2_header(ctx);
			if (rc < 0) {
				return TC_ACT_UNSPEC;
			}
		}
		rc = bpf_redirect_peer(state->ct_result.ifindex_fwd, 0);
		if (rc == TC_ACT_REDIRECT) {
			counter_inc(ctx, CALI_REDIRECT_PEER);
			CALI_DEBUG("Redirect to peer interface (%d) succeeded.", state->ct_result.ifindex_fwd);
			return rc;
		}
	}
	return TC_ACT_UNSPEC;
}

static CALI_BPF_INLINE void fib_error_log(struct cali_tc_ctx *ctx,int rc)
{
	if (rc < 0) {
		CALI_DEBUG("FIB lookup failed (bad input): %d.", rc);
		rc = TC_ACT_UNSPEC;
	} else {
		CALI_DEBUG("FIB lookup failed (FIB problem): %d.", rc);
		rc = TC_ACT_UNSPEC;
	}
}

static CALI_BPF_INLINE int forward_or_drop(struct cali_tc_ctx *ctx)
{
	int rc = ctx->fwd.res;
	struct cali_tc_state *state = ctx->state;
	__u32 fib_flags = 0;

	if (rc == TC_ACT_SHOT) {
		goto deny;
	}

	if (!bpf_core_field_exists(((struct bpf_fib_lookup *)0)->mark)) {
		if (CALI_F_FROM_WEP && EXT_TO_SVC_MARK && ctx->state->ct_result.flags & CALI_CT_FLAG_EXT_LOCAL) {
			/* needs to go via routing in netfilter unless we have access
			 * to BPF_FIB_LOOKUP_MARK in kernel 6.10+
			 */
			goto skip_fib;
		}
	} else {
		fib_flags = BPF_FIB_LOOKUP_MARK;
	}

#ifndef IPVER6
        if ((CALI_F_FROM_HOST || CALI_F_FROM_WEP) && (ctx->state->flags & CALI_ST_FIRST_FRAG)) {
		/* Revalidate the access to the packet */
		if (skb_refresh_validate_ptrs(ctx, UDP_SIZE)) {
			deny_reason(ctx, CALI_REASON_SHORT);
			CALI_DEBUG("Too short");
			goto deny;
		}
		frags4_record_ct(ctx);
	}
#endif
	if (ctx->state->flags & CALI_ST_SKIP_REDIR_ONCE) {
		goto skip_fib;
	}

	if (CALI_F_FROM_WEP && (GLOBAL_FLAGS & CALI_GLOBALS_SKIP_EGRESS_REDIRECT)) {
		goto skip_fib;
	}

	if (rc == CALI_RES_REDIR_BACK) {
		int redir_flags = 0;
		if  (CALI_F_FROM_HOST) {
			redir_flags = BPF_F_INGRESS;
		}

		/* Revalidate the access to the packet */
		if (skb_refresh_validate_ptrs(ctx, UDP_SIZE)) {
			deny_reason(ctx, CALI_REASON_SHORT);
			CALI_DEBUG("Too short");
			goto deny;
		}

		/* Swap the MACs as we are turning it back */
		struct ethhdr *eth_hdr = ctx->data_start;
		unsigned char mac[ETH_ALEN];
		__builtin_memcpy(mac, &eth_hdr->h_dest, ETH_ALEN);
		__builtin_memcpy(&eth_hdr->h_dest, &eth_hdr->h_source, ETH_ALEN);
		__builtin_memcpy(&eth_hdr->h_source, mac, ETH_ALEN);

		rc = bpf_redirect(ctx->skb->ifindex, redir_flags);
		if (rc == TC_ACT_REDIRECT) {
			counter_inc(ctx, CALI_REDIRECT);
			CALI_DEBUG("Redirect to the same interface (%d) succeeded.", ctx->skb->ifindex);
			goto skip_fib;
		}

		CALI_DEBUG("Redirect to the same interface (%d) failed.", ctx->skb->ifindex);
		goto deny;
	} else if (rc == CALI_RES_REDIR_IFINDEX) {
		__u32 iface = state->ct_result.ifindex_fwd;

		struct arp_value *arpv;

		struct arp_key arpk = {
			.ip = iface != NATIN_IFACE ? state->ip_dst : VOID_IP,
			.ifindex = iface,
		};

		arpv = cali_arp_lookup_elem(&arpk);
		if (!arpv) {
			CALI_DEBUG("ARP lookup failed for " IP_FMT " dev %d",
					debug_ip(state->ip_dst), iface);
			goto skip_redir_ifindex;
		}

		/* Revalidate the access to the packet */
		skb_refresh_start_end(ctx);
		if (ctx->data_start + sizeof(struct ethhdr) > ctx->data_end) {
			deny_reason(ctx, CALI_REASON_SHORT);
			CALI_DEBUG("Too short");
			goto deny;
		}

		/* Patch in the MAC addresses that should be set on the next hop. */
		struct ethhdr *eth_hdr = ctx->data_start;
		__builtin_memcpy(&eth_hdr->h_dest, arpv->mac_dst, ETH_ALEN);
		__builtin_memcpy(&eth_hdr->h_source, arpv->mac_src, ETH_ALEN);

		rc = bpf_redirect(iface, 0);
		if (rc == TC_ACT_REDIRECT) {
			counter_inc(ctx, CALI_REDIRECT);
			CALI_DEBUG("Redirect directly to interface (%d) succeeded.", iface);
			goto skip_fib;
		}

skip_redir_ifindex:
		CALI_DEBUG("Redirect directly to interface (%d) failed.", iface);
		/* fall through to FIB if enabled or the IP stack, don't give up yet. */
		rc = TC_ACT_UNSPEC;
	} else if (CALI_F_FROM_HEP && bpf_core_enum_value_exists(enum bpf_func_id, BPF_FUNC_redirect_peer)) {
		if ((rc = try_redirect_to_peer(ctx)) == TC_ACT_REDIRECT) {
			goto skip_fib;
		}
	} else if (CALI_F_FROM_WEP && fwd_fib(&ctx->fwd)) {
		struct cali_rt *dest_rt = cali_rt_lookup(&ctx->state->ip_dst);
		if (dest_rt == NULL) {
			CALI_DEBUG("No route for " IP_FMT " to forward from WEP", &ctx->state->ip_dst);
			goto try_fib_external;
		}

		if (cali_rt_flags_local_host(dest_rt->flags)) {
			goto skip_fib;
		}

		if (state->ct_result.ifindex_fwd == CT_INVALID_IFINDEX) {
			CALI_DEBUG("ifindex_fwd is CT_INVALID_IFINDEX, doing FIB lookup");
			*fib_params(ctx) = (struct bpf_fib_lookup) {
#ifdef IPVER6
				.family = 10, /* AF_INET6 */
#else
				.family = 2, /* AF_INET */
#endif
				.tot_len = 0,
				.ifindex = ctx->skb->ifindex,
				.l4_protocol = state->ip_proto,
			};

			if (bpf_core_field_exists(((struct bpf_fib_lookup *)0)->mark)) {
				fib_params(ctx)->mark = EXT_TO_SVC_MARK;
			}

#ifdef IPVER6
			ipv6_addr_t_to_be32_4_ip(fib_params(ctx)->ipv6_src, &state->ip_src);
			ipv6_addr_t_to_be32_4_ip(fib_params(ctx)->ipv6_dst, &state->ip_dst);
#else
			fib_params(ctx)->ipv4_src = state->ip_src;
			fib_params(ctx)->ipv4_dst = state->ip_dst;
#endif

			rc = bpf_fib_lookup(ctx->skb, fib_params(ctx), sizeof(struct bpf_fib_lookup), fib_flags);
			state->ct_result.ifindex_fwd = fib_params(ctx)->ifindex;
		}

		if (cali_rt_flags_local_workload(dest_rt->flags)) {
			if ((rc = try_redirect_to_peer(ctx)) == TC_ACT_REDIRECT) {
				goto skip_fib;
			}
		} else if ((cali_rt_is_tunneled(dest_rt) && !cali_rt_is_same_subnet(dest_rt))) {
			struct bpf_tunnel_key key = {
				.tunnel_id = OVERLAY_TUNNEL_ID,
			};
			__u64 flags = 0;
			__u32 size = 0;
#ifdef IPVER6
			ipv6_addr_t_to_be32_4_ip(key.remote_ipv6, &dest_rt->next_hop);
			flags |= BPF_F_TUNINFO_IPV6;
			size = offsetof(struct bpf_tunnel_key, local_ipv6);
#else
			key.remote_ipv4 = bpf_htonl(dest_rt->next_hop);
			flags |= BPF_F_ZERO_CSUM_TX;
			size = offsetof(struct bpf_tunnel_key, local_ipv4);
#endif

			int err = bpf_skb_set_tunnel_key(ctx->skb, &key, size, flags);
			CALI_DEBUG("bpf_skb_set_tunnel_key %d nh " IP_FMT, err, &dest_rt->next_hop);
			ctx->fwd.mark |= CALI_SKB_MARK_TUNNEL_KEY_SET;

			rc = bpf_redirect(state->ct_result.ifindex_fwd, 0);
			if (rc == TC_ACT_REDIRECT) {
				counter_inc(ctx, CALI_REDIRECT);
				CALI_DEBUG("Redirect to dev %d without fib lookup",
						state->ct_result.ifindex_fwd);
				goto skip_fib;
			}
		}
	} else if (CALI_F_TUNNEL && CALI_F_TO_HEP) {
		if (!(ctx->skb->mark & CALI_SKB_MARK_SEEN) ||
			!skb_mark_equals(ctx->skb, CALI_SKB_MARK_TUNNEL_KEY_SET, CALI_SKB_MARK_TUNNEL_KEY_SET)) {
			/* packet to vxlan from the host, needs to set tunnel key. Either
			 * it wasn't seen or it was routed via the bpfnat device because
			 * its destination was a service and CTLB is disabled
			 */
			struct cali_rt *dest_rt = cali_rt_lookup(&ctx->state->ip_dst);
			if (dest_rt == NULL) {
				CALI_DEBUG("No route for " IP_FMT " at tunnel device", &ctx->state->ip_dst);
				goto deny;
			}
			if (!cali_rt_is_tunneled(dest_rt)) {
				CALI_DEBUG("Not a tunnel route for " IP_FMT " at tunnel device", &ctx->state->ip_dst);
				// We dont have a tunnel route, so nothing to do here.
				// Better to leave it to the tunnel device to handle it.
				goto skip_fib;
			}

			struct bpf_tunnel_key key = {
				.tunnel_id = OVERLAY_TUNNEL_ID,
			};

			__u64 flags = 0;
			__u32 size = 0;
#ifdef IPVER6
			ipv6_addr_t_to_be32_4_ip(key.remote_ipv6, &dest_rt->next_hop);
			flags |= BPF_F_TUNINFO_IPV6;
			size = offsetof(struct bpf_tunnel_key, local_ipv6);
#else
			key.remote_ipv4 = bpf_htonl(dest_rt->next_hop);
			flags |= BPF_F_ZERO_CSUM_TX;
			size = offsetof(struct bpf_tunnel_key, local_ipv4);
#endif

			int err = bpf_skb_set_tunnel_key(ctx->skb, &key, size, flags);
			CALI_DEBUG("bpf_skb_set_tunnel_key %d nh " IP_FMT, err, &dest_rt->next_hop);
			ctx->fwd.mark |= CALI_SKB_MARK_TUNNEL_KEY_SET;
		}
	}

try_fib_external:
#if CALI_FIB_ENABLED
	/* Only do FIB for packets to be turned around at a HEP on HEP egress. */
	if (CALI_F_TO_HEP && !(ctx->state->flags & CALI_ST_CT_NP_LOOP)) {
		goto skip_fib;
	}

	// Try a short-circuit FIB lookup.
	if (fwd_fib(&ctx->fwd)) {
		/* Revalidate the access to the packet */
		if (skb_refresh_validate_ptrs(ctx, UDP_SIZE)) {
			deny_reason(ctx, CALI_REASON_SHORT);
			CALI_DEBUG("Too short");
			goto deny;
		}

		/* Since we are going to short circuit the IP stack on
		 * forward, check if TTL is still alive. If not, let the
		 * IP stack handle it. It was approved by policy, so it
		 * is safe.
		 */
		if ip_ttl_exceeded(ip_hdr(ctx)) {
			rc = TC_ACT_UNSPEC;
			goto cancel_fib;
		}

		if (CALI_F_TO_HOST && ct_result_is_confirmed(state->ct_result.rc) &&
				state->ct_result.ifindex_fwd != CT_INVALID_IFINDEX &&
				!(state->ct_result.flags & CALI_CT_FLAG_VIA_NAT_IF)) {
			if (ct_result_is_to_workload(state->ct_result.rc)) {
				struct bpf_redir_neigh nh_params = {};

#ifdef IPVER6
				nh_params.nh_family = 10 /* AF_INET6 */;
				__builtin_memcpy(nh_params.ipv6_nh, &state->ip_dst, sizeof(nh_params.ipv6_nh));
#else
				nh_params.nh_family = 2 /* AF_INET */;
				nh_params.ipv4_nh = state->ip_dst;
#endif
				if (CALI_F_L3_DEV) {
					rc = make_room_for_l2_header(ctx);
					if (rc < 0) {
						goto cancel_fib;
					}
				}
				rc = bpf_redirect_neigh(state->ct_result.ifindex_fwd, &nh_params, sizeof(nh_params), 0);
				if (rc == TC_ACT_REDIRECT) {
					counter_inc(ctx, CALI_REDIRECT_NEIGH);
					CALI_DEBUG("Redirect to workload dev %d without fib lookup",
							state->ct_result.ifindex_fwd);
					goto no_fib_redirect;
				}
			}
		}

		*fib_params(ctx) = (struct bpf_fib_lookup) {
#ifdef IPVER6
			.family = 10, /* AF_INET6 */
#else
			.family = 2, /* AF_INET */
#endif
			.tot_len = 0,
			.ifindex = ctx->skb->ifindex,
			.l4_protocol = state->ip_proto,
		};

		if (bpf_core_field_exists(((struct bpf_fib_lookup *)0)->mark)) {
			fib_params(ctx)->mark = EXT_TO_SVC_MARK;
			CALI_DEBUG("FIB mark=0x%d", fib_params(ctx)->mark);
		}

		if (state->ip_proto != IPPROTO_ICMP_46) {
			fib_params(ctx)->sport = bpf_htons(state->sport);
			fib_params(ctx)->dport = bpf_htons(state->dport);
		}

		/* set the ipv4 here, otherwise the ipv4/6 unions do not get
		 * zeroed properly
		 */

#ifdef IPVER6
		ipv6_addr_t_to_be32_4_ip(fib_params(ctx)->ipv6_src, &state->ip_src);
		ipv6_addr_t_to_be32_4_ip(fib_params(ctx)->ipv6_dst, &state->ip_dst);
#else
		fib_params(ctx)->ipv4_src = state->ip_src;
		fib_params(ctx)->ipv4_dst = state->ip_dst;
#endif

		CALI_DEBUG("FIB family=%d", fib_params(ctx)->family);
		CALI_DEBUG("FIB ifindex=%d", fib_params(ctx)->ifindex);
		CALI_DEBUG("FIB l4_protocol=%d", fib_params(ctx)->l4_protocol);
		CALI_DEBUG("FIB sport=%d", bpf_ntohs(fib_params(ctx)->sport));
		CALI_DEBUG("FIB dport=%d", bpf_ntohs(fib_params(ctx)->dport));
#ifdef IPVER6
		CALI_DEBUG("FIB ipv6_src=" IP_FMT, &fib_params(ctx)->ipv6_src);
		CALI_DEBUG("FIB ipv6_dst="IP_FMT, &fib_params(ctx)->ipv6_dst);
#else
		CALI_DEBUG("FIB ipv4_src=" IP_FMT, &fib_params(ctx)->ipv4_src);
		CALI_DEBUG("FIB ipv4_dst="IP_FMT, &fib_params(ctx)->ipv4_dst);
#endif

		CALI_DEBUG("Traffic is towards the host namespace, doing Linux FIB lookup");
		rc = bpf_fib_lookup(ctx->skb, fib_params(ctx), sizeof(struct bpf_fib_lookup),
				ctx->fwd.fib_flags | BPF_FIB_LOOKUP_SKIP_NEIGH | fib_flags);
		switch (rc) {
		case BPF_FIB_LKUP_RET_FRAG_NEEDED:
			/* We are not asking for an MTU check, but we may still get
			 * BPF_FIB_LKUP_RET_FRAG_NEEDED if the device is not yet UP
			 * despite the mtu being larger than the packet
			 * https://github.com/torvalds/linux/blob/3349ada3cffdbe4579872a004360daa31938f683/include/linux/netdevice.h#L4242
			 * This happens on wireguard device in FV test, but the device accepts
			 * forwarded packets. It should be just a start up issue and not a
			 * real issue in production.
			 *
			 * The irony is that if we did ask for MTU check, we would not get
			 * BPF_FIB_LKUP_RET_NO_NEIGH and all would proceed as expected.
			 * But we do not want to ask for an MTU check for various reason
			 * related to us growing the packets ourselves.
			 * https://github.com/projectcalico/calico/commit/78c85f96b2aa4ae76acfaa04bb8823c2ad76f9bd
			 */
			CALI_DEBUG("mtu_result %d dev %d", fib_params(ctx)->mtu_result, fib_params(ctx)->ifindex);
			if (!skb_is_gso(ctx->skb) && fib_params(ctx)->mtu_result < bpf_htons(ctx->state->ip_size)) {
				fib_error_log(ctx, rc);
				rc = TC_ACT_UNSPEC;
				break;
			}
		case 0:
		case BPF_FIB_LKUP_RET_NO_NEIGH:
#ifdef IPVER6
			CALI_DEBUG("FIB lookup succeeded - gw " IP_FMT, &fib_params(ctx)->ipv6_dst);
#else
			CALI_DEBUG("FIB lookup succeeded - gw " IP_FMT, &fib_params(ctx)->ipv4_dst);
#endif

			if (!fib_approve(ctx, fib_params(ctx)->ifindex)) {
				ctx->fwd.reason = CALI_REASON_WEP_NOT_READY;
				goto deny;
			}

			struct bpf_redir_neigh nh_params = {};

			nh_params.nh_family = fib_params(ctx)->family;
#ifdef IPVER6
			__builtin_memcpy(nh_params.ipv6_nh, fib_params(ctx)->ipv6_dst, sizeof(nh_params.ipv6_nh));
#else
			nh_params.ipv4_nh = fib_params(ctx)->ipv4_dst;
#endif

			CALI_DEBUG("Got Linux FIB hit, redirecting to iface %d.", fib_params(ctx)->ifindex);

			if (CALI_F_L3_DEV) {
				rc = make_room_for_l2_header(ctx);
				if (rc < 0) {
					goto cancel_fib;
				}
			}
			rc = bpf_redirect_neigh(fib_params(ctx)->ifindex, &nh_params, sizeof(nh_params), 0);
			break;
		default:
			fib_error_log(ctx, rc);
			rc = TC_ACT_UNSPEC;
		}

no_fib_redirect:
		/* now we know we will bypass IP stack and ip->ttl > 1, decrement it! */
		if (rc == TC_ACT_REDIRECT) {
#ifndef UNITTEST
#ifdef IPVER6
			ip_hdr(ctx)->hop_limit--;
#else
			ip_dec_ttl(ip_hdr(ctx));
#endif
#endif /* UNITTEST - makes comparing equivalency on packets difficult as TTL and csum change */
		}
	}

cancel_fib:
#endif /* CALI_FIB_ENABLED */
	if (ctx->state->flags & CALI_ST_CT_NP_LOOP) {
		__u32 mark = CALI_SKB_MARK_SEEN;

		if (rc != TC_ACT_REDIRECT /* no FIB or failed */ ) {
			CALI_DEBUG("No FIB or failed, redirect to NATIF.");
			__u32 iface = NATIN_IFACE;

			struct arp_key arpk = {
				.ifindex = iface,
			};

			ip_set_void(arpk.ip);

			struct arp_value *arpv = cali_arp_lookup_elem(&arpk);
			if (!arpv) {
				ctx->fwd.reason = CALI_REASON_NATIFACE;
				CALI_DEBUG("ARP lookup failed for " IP_FMT " dev %d",
						debug_ip(state->ip_dst), iface);
				goto deny;
			}

			/* Revalidate the access to the packet */
			skb_refresh_start_end(ctx);
			if (ctx->data_start + sizeof(struct ethhdr) > ctx->data_end) {
				ctx->fwd.reason = CALI_REASON_SHORT;
				CALI_DEBUG("Too short");
				goto deny;
			}

			/* Patch in the MAC addresses that should be set on the next hop. */
			struct ethhdr *eth_hdr = ctx->data_start;
			__builtin_memcpy(&eth_hdr->h_dest, arpv->mac_dst, ETH_ALEN);
			__builtin_memcpy(&eth_hdr->h_source, arpv->mac_src, ETH_ALEN);

			rc = bpf_redirect(iface, 0);
			if (rc != TC_ACT_REDIRECT) {
				ctx->fwd.reason = CALI_REASON_NATIFACE;
				CALI_DEBUG("Redirect directly to bpfnatin failed.");
				goto deny;
			}

			CALI_DEBUG("Redirect directly to interface bpfnatin succeeded.");

			mark = CALI_SKB_MARK_BYPASS;

			if (ctx->state->flags & CALI_ST_CT_NP_REMOTE) {
				mark = CALI_SKB_MARK_BYPASS_FWD;
			}
		}

		CALI_DEBUG("Setting mark to 0x%x", mark);
		skb_set_mark(ctx->skb, mark);
	}

skip_fib:

	if (CALI_F_TO_HOST) {
		/* Packet is towards host namespace, mark it so that downstream
		 * programs know that they're not the first to see the packet.
		 */
		ctx->fwd.mark |=  CALI_SKB_MARK_SEEN;
		if (ctx->state->ct_result.flags & CALI_CT_FLAG_EXT_LOCAL) {
			CALI_DEBUG("To host marked with FLAG_EXT_LOCAL");
			ctx->fwd.mark |= EXT_TO_SVC_MARK;
		}

		if (CALI_F_NAT_IF) {
			/* We mark the packet so that next iface knows, it went through
			 * bpfnatout - if it gets (S)NATed, a new connection is created
			 * and we know that returning packets must go via bpfnatout again.
			 */
			ctx->fwd.mark |= CALI_SKB_MARK_FROM_NAT_IFACE_OUT;
			CALI_DEBUG("marking CALI_SKB_MARK_FROM_NAT_IFACE_OUT");
		}

		if (ct_result_is_related(state->ct_result.rc)) {
			CALI_DEBUG("Related traffic, marking with CALI_SKB_MARK_RELATED_RESOLVED");
			ctx->fwd.mark |= CALI_SKB_MARK_RELATED_RESOLVED;
		}

		CALI_DEBUG("Traffic is towards host namespace, marking with 0x%x.", ctx->fwd.mark);

		/* FIXME: this ignores the mask that we should be using.
		 * However, if we mask off the bits, then clang spots that it
		 * can do a 16-bit store instead of a 32-bit load/modify/store,
		 * which trips up the validator.
		 */
		skb_set_mark(ctx->skb, ctx->fwd.mark); /* make sure that each pkt has SEEN mark */
	}

	goto allow;

deny:
	rc = TC_ACT_SHOT;

allow:
	if (CALI_LOG_LEVEL_INFO >= CALI_LOG_LEVEL_INFO || PROFILING) {
		__u64 prog_end_time = bpf_ktime_get_ns();

		if (PROFILING) {
			prof_record_sample(ctx->skb->ifindex,
				(CALI_F_FROM_HEP || CALI_F_TO_WEP ? 0 : 2) +
					(ct_result_rc(ctx->state->ct_result.rc) == CALI_CT_NEW ? 0 : 1),
				state->prog_start_time, prog_end_time);
		}

		if (rc ==  TC_ACT_SHOT) {
			CALI_INFO("Final result=DENY (%d). Program execution time: %lluns",
					ctx->fwd.reason, prog_end_time-state->prog_start_time);
		} else {
			if (CALI_F_VXLAN && CALI_F_TO_HOST) {
				bpf_skb_change_type(ctx->skb, PACKET_HOST);
			}
			CALI_INFO("Final result=ALLOW rc %d. Program execution time: %lluns",
					rc, prog_end_time-state->prog_start_time);
		}
	}

	return rc;
}

#endif /* __CALI_FIB_CO_RE_H__ */
