summaryrefslogtreecommitdiffstats
path: root/vnet
AgeCommit message (Expand)AuthorFilesLines
2016-07-11VPP-183: IPSec transport modeMatus Fabian3-17/+112
2016-07-09dpdk: disable CRC strippingDamjan Marion1-1/+1
2016-07-09packet-generator: fix pcap stream supportDamjan Marion2-4/+18
2016-07-08IPv6 frag: avoid overflow while parsing extension headersYoann Desmouceaux1-0/+7
2016-07-08Add locator prority and weight to LISP APIFilip Tehlar1-5/+20
2016-07-08Remove unnecessary and obsolete configure.ac directivesDamjan Marion1-2/+0
2016-07-08Add binary API for IPFIXJuraj Sloboda2-1/+5
2016-07-08Make IPFIX src port configurableJuraj Sloboda3-1/+8
2016-07-08Allow DPDK per interface startup config to enable/disable VLAN strippingJohn Lo2-8/+27
2016-07-08Reset IPFIX streams after configuration changeJuraj Sloboda1-0/+17
2016-07-07Add configuration options for IPFIXJuraj Sloboda3-11/+52
2016-07-07Use arbitrary FIB for IPFIXJuraj Sloboda3-8/+20
2016-07-07VPP-142 Recursive route sending traffic to wrong interfaceNeale4-112/+188
2016-07-07Fix bugs and do some optimization in IPFIX codeJuraj Sloboda2-6/+22
2016-07-07Document more nodesDave Barach3-0/+142
2016-07-07Fix deletion forwarding entries when deleting static remote mappingFilip Tehlar1-0/+3
2016-07-07Retire support for DPDK 2.1.0 and olderDamjan Marion8-197/+2
2016-07-07Add some doxygen tagsDave Barach1-0/+36
2016-07-07Add an option to dump details about specific LISP EID in API/CLIFilip Tehlar2-11/+66
2016-07-06Retire PLATFORM=virlDamjan Marion3-10/+2
2016-07-06Add support for capturing packets on packet generator interfacesDamjan Marion8-53/+215
2016-07-06Netmap: Fix Netmap Polling IssueMohsin KAZMI1-7/+31
2016-07-06Bug fix for VPP-104 about not being able to down a sub-if if the super-if is upCalvin1-1/+3
2016-07-06VPP-182: IPv4 static ARP entries should not be deleted on interface downJohn Lo1-19/+24
2016-07-06VPP-177: IPsec empty buffers allocation fixMatus Fabian2-2/+4
2016-07-05VPP-144: Fix that shows the empty segment field in sh sr tunnelCalvin1-1/+6
2016-07-05VPP-179 Fix adjacency reference-count botchesDave Barach2-2/+24
2016-07-04LISP CP cleanup and refactoringFlorin Coras7-727/+808
2016-07-01VPP-171: fix a set of hw interface recycling bugsDave Barach3-1/+27
2016-06-30VPP-163 "show ip6 interface" ignores many addressesChris Luke2-24/+61
2016-06-30Fix buffer leak from L2 flooding replication processPierre Pfister1-0/+1
2016-06-30Fix clang buildDamjan Marion2-5/+5
2016-06-29Fix the spelling of the word "suppress".Chris Luke2-11/+13
2016-06-29Add support for ethernet address in LISP APIFilip Tehlar1-1/+2
2016-06-29Don't re-write adjacency with same information.Keith Burns (alagalah)1-9/+17
2016-06-29Decouple worker thread code from dpdk, enable worker threads in vpp_liteDamjan Marion7-600/+9
2016-06-29VPP-158: VPP crashes in IKEv2 code when running multithreadedMatthew Smith6-148/+222
2016-06-28VPP-48 Fixes for ip4/6 ttl checks and icmp responsesChris Luke6-72/+244
2016-06-28Fix native build on non x86_64 systemsDamjan Marion1-0/+2
2016-06-28Reduce ring size for dpdk NICs and overtal mem footprintDamjan Marion3-7/+7
2016-06-27VPP-108 : API calls to read classify table and sessionsPavel Kotucek1-1/+2
2016-06-27Add MAC address support to LISP map-cacheFilip Tehlar5-17/+131
2016-06-26Misc. janitorial work:Dave Barach5-25/+19
2016-06-25Netmap: Resolve interface state issueMohsin KAZMI1-3/+0
2016-06-25vhost-dpdk: dequeue size fixZhihong Wang1-4/+12
2016-06-25add buf_physaddr to dpdk traceGeorgii Tkachuk1-2/+2
2016-06-24netmap: multithreading supportMohsin KAZMI4-16/+70
2016-06-24Move vcgn as pluginShesha Sreenivasamurthy69-36506/+1
2016-06-24Reformat output of lisp eid-table show command.Filip Tehlar3-11/+66
2016-06-24Add admin-up flag to L2TP tunnels and start tunnels set to downPierre Pfister4-6/+42
pan class="p">); n_left_from = frame->n_vectors; next_index = node->cached_next_index; while (n_left_from > 0) { u32 n_left_to_next; vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next); while (n_left_from > 0 && n_left_to_next > 0) { u32 bi0; vlib_buffer_t *b0; u32 next0; u32 device_index0; u32 len0; ethernet_header_t *en0; int i; /* speculatively enqueue b0 to the current next frame */ bi0 = from[0]; to_next[0] = bi0; from += 1; to_next += 1; n_left_from -= 1; n_left_to_next -= 1; b0 = vlib_get_buffer (vm, bi0); /* Set next0 to e.g. interface-tx */ if (is_tx) vnet_get_config_data (&fcm->config_main, &b0->current_config_index, &next0, /* # bytes of config data */ 0); else next0 = MACTIME_NEXT_ETHERNET_INPUT; vlib_buffer_advance (b0, -(word) vnet_buffer (b0)->l2_hdr_offset); len0 = vlib_buffer_length_in_chain (vm, b0); en0 = vlib_buffer_get_current (b0); kv.key = 0; if (is_tx) clib_memcpy (&kv.key, en0->dst_address, 6); else clib_memcpy (&kv.key, en0->src_address, 6); /* Lookup the src/dst mac address */ if (clib_bihash_search_8_8 (lut, &kv, &kv) < 0) { /* Create a table entry... */ mactime_send_create_entry_message (is_tx ? en0->dst_address : en0->src_address); /* and let this packet pass */ device_index0 = ~0; dp = 0; packets_ok++; goto trace0; } else device_index0 = kv.value; dp = pool_elt_at_index (mm->devices, device_index0); /* Static drop / allow? */ if (PREDICT_FALSE (dp->flags & (MACTIME_DEVICE_FLAG_STATIC_DROP | MACTIME_DEVICE_FLAG_STATIC_ALLOW))) { if (dp->flags & MACTIME_DEVICE_FLAG_STATIC_DROP) { next0 = MACTIME_NEXT_DROP; vlib_increment_combined_counter (&mm->drop_counters, thread_index, dp - mm->devices, 1, len0); packets_dropped++; } else /* note next0 set to allow */ { vlib_increment_combined_counter (&mm->allow_counters, thread_index, dp - mm->devices, 1, len0); packets_ok++; } goto trace0; } /* Known device, see if traffic allowed at the moment */ for (i = 0; i < vec_len (dp->ranges); i++) { clib_timebase_range_t *r = dp->ranges + i; f64 start0, end0; start0 = r->start + mm->sunday_midnight; end0 = r->end + mm->sunday_midnight; /* Packet within time range */ if (now >= start0 && now <= end0) { /* And it's a drop range, drop it */ if (dp->flags & MACTIME_DEVICE_FLAG_DYNAMIC_DROP) { vlib_increment_combined_counter (&mm->drop_counters, thread_index, dp - mm->devices, 1, len0); packets_dropped++; next0 = MACTIME_NEXT_DROP; } else /* it's an allow range, allow it */ { vlib_increment_combined_counter (&mm->allow_counters, thread_index, dp - mm->devices, 1, len0); packets_ok++; } goto trace0; } } /* * Didn't hit a range, so *drop* if allow configured, or * *allow* if drop configured. */ if (dp->flags & MACTIME_DEVICE_FLAG_DYNAMIC_ALLOW) { next0 = MACTIME_NEXT_DROP; vlib_increment_combined_counter (&mm->drop_counters, thread_index, dp - mm->devices, 1, len0); packets_dropped++; } else { vlib_increment_combined_counter (&mm->allow_counters, thread_index, dp - mm->devices, 1, len0); packets_ok++; } trace0: if (PREDICT_FALSE ((node->flags & VLIB_NODE_FLAG_TRACE) && (b0->flags & VLIB_BUFFER_IS_TRACED))) { mactime_trace_t *t = vlib_add_trace (vm, node, b0, sizeof (*t)); clib_memcpy (t->src_mac, en0->src_address, sizeof (t->src_mac)); t->next_index = next0; t->device_index = device_index0; if (dp) { clib_memcpy (t->device_name, dp->device_name, ARRAY_LEN (t->device_name)); t->device_name[ARRAY_LEN (t->device_name) - 1] = 0; } } /* verify speculative enqueue, maybe switch current next frame */ vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next, n_left_to_next, bi0, next0); } vlib_put_next_frame (vm, node, next_index, n_left_to_next); } vlib_node_increment_counter (vm, node->node_index, MACTIME_ERROR_DROP, packets_dropped); vlib_node_increment_counter (vm, node->node_index, MACTIME_ERROR_OK, packets_ok); return frame->n_vectors; } static uword mactime_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame) { return mactime_node_inline (vm, node, frame, 0 /* is_tx */ ); } /* *INDENT-OFF* */ VLIB_REGISTER_NODE (mactime_node) = { .function = mactime_node_fn, .name = "mactime", .vector_size = sizeof (u32), .format_trace = format_mactime_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(mactime_error_strings), .error_strings = mactime_error_strings, .n_next_nodes = MACTIME_N_NEXT, /* edit / add dispositions here */ .next_nodes = { [MACTIME_NEXT_ETHERNET_INPUT] = "ethernet-input", [MACTIME_NEXT_DROP] = "error-drop", }, }; /* *INDENT-ON* */ static uword mactime_tx_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame) { return mactime_node_inline (vm, node, frame, 1 /* is_tx */ ); } /* *INDENT-OFF* */ VLIB_REGISTER_NODE (mactime_tx_node) = { .function = mactime_tx_node_fn, .name = "mactime-tx", .vector_size = sizeof (u32), .format_trace = format_mactime_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(mactime_error_strings), .error_strings = mactime_error_strings, .n_next_nodes = MACTIME_N_NEXT, /* edit / add dispositions here */ .next_nodes = { [MACTIME_NEXT_DROP] = "error-drop", [MACTIME_NEXT_ETHERNET_INPUT] = "ethernet-input", /* notused */ }, }; /* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */