/* *------------------------------------------------------------------ * Copyright (c) 2017 Intel and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. *------------------------------------------------------------------ */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include gtpu_main_t gtpu_main; /* *INDENT-OFF* */ VNET_FEATURE_INIT (ip4_gtpu_bypass, static) = { .arc_name = "ip4-unicast", .node_name = "ip4-gtpu-bypass", .runs_before = VNET_FEATURES ("ip4-lookup"), }; VNET_FEATURE_INIT (ip6_gtpu_bypass, static) = { .arc_name = "ip6-unicast", .node_name = "ip6-gtpu-bypass", .runs_before = VNET_FEATURES ("ip6-lookup"), }; /* *INDENT-on* */ u8 * format_gtpu_encap_trace (u8 * s, va_list * args) { CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *); CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *); gtpu_encap_trace_t * t = va_arg (*args, gtpu_encap_trace_t *); s = format (s, "GTPU encap to gtpu_tunnel%d tteid %d", t->tunnel_index, t->tteid); return s; } static u8 * format_decap_next (u8 * s, va_list * args) { u32 next_index = va_arg (*args, u32); switch (next_index) { case GTPU_INPUT_NEXT_DROP: return format (s, "drop"); case GTPU_INPUT_NEXT_L2_INPUT: return format (s, "l2"); case GTPU_INPUT_NEXT_IP4_INPUT: return format (s, "ip4"); case GTPU_INPUT_NEXT_IP6_INPUT: return format (s, "ip6"); default: return format (s, "index %d", next_index); } return s; } u8 * format_gtpu_tunnel (u8 * s, va_list * args) { gtpu_tunnel_t *t = va_arg (*args, gtpu_tunnel_t *); gtpu_main_t *ngm = >pu_main; ip4_main_t *im4 = &ip4_main; ip6_main_t *im6 = &ip6_main; u8 is_ipv6 = !ip46_address_is_ip4 (&t->dst); u32 encap_vrf_id = is_ipv6 ? im6->fibs[t->encap_fib_index].ft_table_id : im4->fibs[t->encap_fib_index].ft_table_id; s = format (s, "[%d] src %U dst %U teid %d tteid %d " "encap-vrf-id %d sw-if-idx %d ", t - ngm->tunnels, format_ip46_address, &t->src, IP46_TYPE_ANY, format_ip46_address, &t->dst, IP46_TYPE_ANY, t->teid, t->tteid, encap_vrf_id, t->sw_if_index); s = format (s, "encap-dpo-idx %d ", t->next_dpo.dpoi_index); s = format (s, "decap-next-%U ", format_decap_next, t->decap_next_index); if (PREDICT_FALSE (ip46_address_is_multicast (&t->dst))) s = format (s, "mcast-sw-if-idx %d ", t->mcast_sw_if_index); return s; } static u8 * format_gtpu_name (u8 * s, va_list * args) { u32 dev_instance = va_arg (*args, u32); return format (s, "gtpu_tunnel%d", dev_instance); } static clib_error_t * gtpu_interface_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags) { u32 hw_flags = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP) ? VNET_HW_INTERFACE_FLAG_LINK_UP : 0; vnet_hw_interface_set_flags (vnm, hw_if_index, hw_flags); return /* no error */ 0; } /* *INDENT-OFF* */ VNET_DEVICE_CLASS (gtpu_device_class,static) = { .name = "GTPU", .format_device_name = format_gtpu_name, .format_tx_trace = format_gtpu_encap_trace, .admin_up_down_function = gtpu_interface_admin_up_down, }; /* *INDENT-ON* */ static u8 * format_gtpu_header_with_length (u8 * s, va_list * args) { u32 dev_instance = va_arg (*args, u32); s = format (s, "unimplemented dev %u", dev_instance); return s; } /* *INDENT-OFF* */ VNET_HW_INTERFACE_CLASS (gtpu_hw_class) = { .name = "GTPU", .format_header = format_gtpu_header_with_length, .build_rewrite = default_build_rewrite, .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P, }; /* *INDENT-ON* */ static void gtpu_tunnel_restack_dpo (gtpu_tunnel_t * t) { dpo_id_t dpo = DPO_INVALID; u32 encap_index = ip46_address_is_ip4 (&t->dst) ? gtpu4_encap_node.index : gtpu6_encap_node.index; fib_forward_chain_type_t forw_type = ip46_address_is_ip4 (&t->dst) ? FIB_FORW_CHAIN_TYPE_UNICAST_IP4 : FIB_FORW_CHAIN_TYPE_UNICAST_IP6; fib_entry_contribute_forwarding (t->fib_entry_index, forw_type, &dpo); dpo_stack_from_node (encap_index, &t->next_dpo, &dpo); dpo_reset (&dpo); } static gtpu_tunnel_t * gtpu_tunnel_from_fib_node (fib_node_t * node) { return ((gtpu_tunnel_t *) (((char *) node) - STRUCT_OFFSET_OF (gtpu_tunnel_t, node))); } /** * Function definition to backwalk a FIB node - * Here we will restack the new dpo of GTPU DIP to encap node. */ static fib_node_back_walk_rc_t gtpu_tunnel_back_walk (fib_node_t * node, fib_node_back_walk_ctx_t * ctx) { gtpu_tunnel_restack_dpo (gtpu_tunnel_from_fib_node (node)); return (FIB_NODE_BACK_WALK_CONTINUE); } /** * Function definition to get a FIB node from its index */ static fib_node_t * gtpu_tunnel_fib_node_get (fib_node_index_t index) { gtpu_tunnel_t *t; gtpu_main_t *gtm = >pu_main; t = pool_elt_at_index (gtm->tunnels, index); return (&t->node); } /** * Function definition to inform the FIB node that its last lock has gone. */ static void gtpu_tunnel_last_lock_gone (fib_node_t * node) { /* * The GTPU tunnel is a root of the graph. As such * it never has children and thus is never locked. */ ASSERT (0); } /* * Virtual function table registered by GTPU tunnels * for participation in the FIB object graph. */ const static fib_node_vft_t gtpu_vft = { .fnv_get = gtpu_tunnel_fib_node_get, .fnv_last_lock = gtpu_tunnel_last_lock_gone, .fnv_back_walk = gtpu_tunnel_back_walk, }; #define foreach_copy_field \ _(teid) \ _(tteid) \ _(mcast_sw_if_index) \ _(encap_fib_index) \ _(decap_next_index) \ _(src) \ _(dst) static void ip_udp_gtpu_rewrite (gtpu_tunnel_t * t, bool is_ip6) { union { ip4_gtpu_header_t *h4; ip6_gtpu_header_t *h6; u8 *rw; } r = { .rw = 0}; int len = is_ip6 ? sizeof *r.h6 : sizeof *r.h4; vec_validate_aligned (r.rw, len - 1, CLIB_CACHE_LINE_BYTES); udp_header_t *udp; gtpu_header_t *gtpu; /* Fixed portion of the (outer) ip header */ if (!is_ip6) { ip4_header_t *ip = &r.h4->ip4; udp = &r.h4->udp; gtpu = &r.h4->gtpu; ip->ip_version_and_header_length = 0x45; ip->ttl = 254; ip->protocol = IP_PROTOCOL_UDP; ip->src_address = t->src.ip4; ip->dst_address = t->dst.ip4; /* we
packet-generator new {
  name x0
  limit 1
  node ip4-input
  size 64-64
  data {
    ICMP: 1.0.0.2 -> 2.0.0.2
    ICMP echo_request
    incrementing 100
  }
}
packet-generator new {
  name x1
  limit 1
  node ip4-input
  size 64-64
  data {
    ICMP: 1.0.0.2 -> 2.0.1.2
    ICMP echo_request
    incrementing 100
  }
}
packet-generator new {
  name x2
  limit 1
  node ip4-input
  size 64-64
  data {
    ICMP: 1.0.0.2 -> 2.0.2.2
    ICMP echo_request
    incrementing 100
  }
}
packet-generator new {
  name x3
  limit 1
  node ip4-input
  size 64-64
  data {
    ICMP: 1.0.0.2 -> 2.0.3.2
    ICMP echo_request
    incrementing 100
  }
}



trace add pg-input 100

loop create
set int state loop0 up

set int ip address loop0 10.0.0.1/24
set ip neighbor loop0 10.0.0.2 00:00:11:aa:bb:cc

mpls tunnel add via 10.0.0.2 loop0 out-label 33 out-label 34 out-label 35 out-label 36
set int state mpls-tunnel0 up
set int ip addr  mpls-tunnel0 192.168.0.1/32
ip route add 2.0.0.2/32 via 192.168.0.2 mpls-tunnel0


mpls tunnel add via 10.0.0.2 out-label 33
set int state mpls-tunnel1 up
set int ip addr  mpls-tunnel1 192.168.1.1/32
ip route add 2.0.1.2/32 via 192.168.1.2 mpls-tunnel1 out-label 99

mpls tunnel add via 10.0.0.2 loop0 out-label 3
set int state mpls-tunnel2 up
set int ip addr  mpls-tunnel2 192.168.2.1/32
ip route add 2.0.2.2/32 via 192.168.2.2 mpls-tunnel2


mpls tunnel add l2-only via 10.0.0.2 loop0 out-label 234 out-label 0
set int state mpls-tunnel3 up
set int l2 bridge mpls-tunnel3 1

loop create
set int ip addr loop1 6.0.1.44/24
set int l2 bridge loop1 1 bvi
set int l2 learn loop1 disable
set int state loop1 up

ip route add 2.0.3.2/32 via 6.0.1.45 loop1
ib_main_t *vm = gtm->vlib_main; u32 node_index; u32 tmp; if (unformat (input, "l2")) *result = GTPU_INPUT_NEXT_L2_INPUT; else if (unformat (input, "ip4")) *result = GTPU_INPUT_NEXT_IP4_INPUT; else if (unformat (input, "ip6")) *result = GTPU_INPUT_NEXT_IP6_INPUT; else if (unformat (input, "node %U", unformat_vlib_node, vm, &node_index)) *result = get_decap_next_for_node (node_index, ipv4_set); else if (unformat (input, "%d", &tmp)) *result = tmp; else return 0; return 1; } static clib_error_t * gtpu_add_del_tunnel_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; ip46_address_t src, dst; u8 opn = GTPU_ADD_TUNNEL; u8 src_set = 0; u8 dst_set = 0; u8 grp_set = 0; u8 ipv4_set = 0; u8 ipv6_set = 0; u32 encap_fib_index = 0; u32 mcast_sw_if_index = ~0; u32 decap_next_index = GTPU_INPUT_NEXT_L2_INPUT; u32 teid = 0, tteid = 0; u32 tmp; int rv; vnet_gtpu_add_mod_del_tunnel_args_t _a, *a = &_a; u32 tunnel_sw_if_index; clib_error_t *error = NULL; /* Cant "universally zero init" (={0}) due to GCC bug 53119 */ clib_memset (&src, 0, sizeof src); clib_memset (&dst, 0, sizeof dst); /* Get a line of input. */ if (!unformat_user (input, unformat_line_input, line_input)) return 0; while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) { if (unformat (line_input, "del")) { opn = GTPU_DEL_TUNNEL; } else if (unformat (line_input, "src %U", unformat_ip4_address, &src.ip4)) { src_set = 1; ipv4_set = 1; } else if (unformat (line_input, "dst %U", unformat_ip4_address, &dst.ip4)) { dst_set = 1; ipv4_set = 1; } else if (unformat (line_input, "src %U", unformat_ip6_address, &src.ip6)) { src_set = 1; ipv6_set = 1; } else if (unformat (line_input, "dst %U", unformat_ip6_address, &dst.ip6)) { dst_set = 1; ipv6_set = 1; } else if (unformat (line_input, "group %U %U", unformat_ip4_address, &dst.ip4, unformat_vnet_sw_interface, vnet_get_main (), &mcast_sw_if_index)) { grp_set = dst_set = 1; ipv4_set = 1; } else if (unformat (line_input, "group %U %U", unformat_ip6_address, &dst.ip6, unformat_vnet_sw_interface, vnet_get_main (), &mcast_sw_if_index)) { grp_set = dst_set = 1; ipv6_set = 1; } else if (unformat (line_input, "encap-vrf-id %d", &tmp)) { encap_fib_index = fib_table_find (fib_ip_proto (ipv6_set), tmp); if (encap_fib_index == ~0) { error = clib_error_return (0, "nonexistent encap-vrf-id %d", tmp); goto done; } } else if (unformat (line_input, "decap-next %U", unformat_decap_next, &decap_next_index, ipv4_set)) ; else if (unformat (line_input, "teid %d", &teid)) ; else if (unformat (line_input, "tteid %d", &tteid)) ; else if (unformat (line_input, "upd-tteid %d", &tteid)) opn = GTPU_UPD_TTEID; else { error = clib_error_return (0, "parse error: '%U'", format_unformat_error, line_input); goto done; } } if (teid == 0) { error = clib_error_return (0, "tunnel teid specified"); goto done; } if (src_set == 0 && opn == GTPU_ADD_TUNNEL) { error = clib_error_return (0, "tunnel src address not specified"); goto done; } if (dst_set == 0) { error = clib_error_return (0, "tunnel dst address not specified"); goto done; } if (grp_set && !ip46_address_is_multicast (&dst)) { error = clib_error_return (0, "tunnel group address not multicast"); goto done; } if (grp_set == 0 && ip46_address_is_multicast (&dst)) { error = clib_error_return (0, "dst address must be unicast"); goto done; } if (grp_set && mcast_sw_if_index == ~0) { error = clib_error_return (0, "tunnel nonexistent multicast device"); goto done; } if (ipv4_set && ipv6_set) { error = clib_error_return (0, "both IPv4 and IPv6 addresses specified"); goto done; } if (ip46_address_cmp (&src, &dst) == 0) { error = clib_error_return (0, "src and dst addresses are identical"); goto done; } if (decap_next_index == ~0) { error = clib_error_return (0, "next node not found"); goto done; } clib_memset (a, 0, sizeof (*a)); a->opn = opn; #define _(x) a->x = x; foreach_copy_field; #undef _ rv = vnet_gtpu_add_mod_del_tunnel (a, &tunnel_sw_if_index); switch (rv) { case 0: if (opn == GTPU_ADD_TUNNEL) vlib_cli_output (vm, "%U\n", format_vnet_sw_if_index_name, vnet_get_main (), tunnel_sw_if_index); break; case VNET_API_ERROR_TUNNEL_EXIST: error = clib_error_return (0, "tunnel already exists..."); goto done; case VNET_API_ERROR_NO_SUCH_ENTRY: error = clib_error_return (0, "tunnel does not exist..."); goto done; case VNET_API_ERROR_INVALID_VALUE: error = clib_error_return (0, "tx teid not specified..."); goto done; default: error = clib_error_return (0, "vnet_gtpu_add_del_tunnel returned %d", rv); goto done; } done: unformat_free (line_input); return error; } /*? * Add or delete a GTPU Tunnel. * * GTPU can be used to transport Ethernet packets as its PDU type to * provides allow L2 network or bridge domains (BDs) * to span multiple servers. This is done by building an L2 overlay on * top of an L3 network underlay using GTPU tunnels. * * GTPU can also be used to transport IP packetes as its PDU type to * allow IP forwarding over underlay network, e.g. between RAN and UPF * for mobility deplyments. * * @cliexpar * Example of how to create a GTPU Tunnel: * @cliexcmd{create gtpu tunnel src 10.0.3.1 dst 10.0.3.3 teid 13 tteid 55 encap-vrf-id 7} * Example of how to delete a GTPU Tunnel: * @cliexcmd{create gtpu tunnel src 10.0.3.1 dst 10.0.3.3 teid 13 encap-vrf-id 7 del} * Example of how to update tx TEID of a GTPU Tunnel: * @cliexcmd{create gtpu tunnel src 10.0.3.1 dst 10.0.3.3 encap-vrf-id 7 upd-tteid 55} ?*/ /* *INDENT-OFF* */ VLIB_CLI_COMMAND (create_gtpu_tunnel_command, static) = { .path = "create gtpu tunnel", .short_help = "create gtpu tunnel src " " {dst |group }" " teid [tteid ] [encap-vrf-id ]" " [decap-next [l2|ip4|ip6|node ]] [del | upd-tteid ]", .function = gtpu_add_del_tunnel_command_fn, }; /* *INDENT-ON* */ static clib_error_t * show_gtpu_tunnel_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { gtpu_main_t *gtm = >pu_main; gtpu_tunnel_t *t; if (pool_elts (gtm->tunnels) == 0) vlib_cli_output (vm, "No gtpu tunnels configured..."); pool_foreach (t, gtm->tunnels) { vlib_cli_output (vm, "%U", format_gtpu_tunnel, t); } return 0; } /*? * Display all the GTPU Tunnel entries. * * @cliexpar * Example of how to display the GTPU Tunnel entries: * @cliexstart{show gtpu tunnel} * [0] src 10.0.3.1 dst 10.0.3.3 teid 13 tx-teid 55 encap_fib_index 0 sw_if_index 5 decap_next l2 * @cliexend ?*/ /* *INDENT-OFF* */ VLIB_CLI_COMMAND (show_gtpu_tunnel_command, static) = { .path = "show gtpu tunnel", .short_help = "show gtpu tunnel", .function = show_gtpu_tunnel_command_fn, }; /* *INDENT-ON* */ void vnet_int_gtpu_bypass_mode (u32 sw_if_index, u8 is_ip6, u8 is_enable) { if (is_ip6) vnet_feature_enable_disable ("ip6-unicast", "ip6-gtpu-bypass", sw_if_index, is_enable, 0, 0); else vnet_feature_enable_disable ("ip4-unicast", "ip4-gtpu-bypass", sw_if_index, is_enable, 0, 0); } static clib_error_t * set_ip_gtpu_bypass (u32 is_ip6, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; vnet_main_t *vnm = vnet_get_main (); clib_error_t *error = 0; u32 sw_if_index, is_enable; sw_if_index = ~0; is_enable = 1; if (!unformat_user (input, unformat_line_input, line_input)) return 0; while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) { if (unformat_user (line_input, unformat_vnet_sw_interface, vnm, &sw_if_index)) ; else if (unformat (line_input, "del")) is_enable = 0; else { error = unformat_parse_error (line_input); goto done; } } if (~0 == sw_if_index) { error = clib_error_return (0, "unknown interface `%U'", format_unformat_error, line_input); goto done; } vnet_int_gtpu_bypass_mode (sw_if_index, is_ip6, is_enable); done: unformat_free (line_input); return error; } static clib_error_t * set_ip4_gtpu_bypass (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return set_ip_gtpu_bypass (0, input, cmd); } /*? * This command adds the 'ip4-gtpu-bypass' graph node for a given interface. * By adding the IPv4 gtpu-bypass graph node to an interface, the node checks * for and validate input gtpu packet and bypass ip4-lookup, ip4-local, * ip4-udp-lookup nodes to speedup gtpu packet forwarding. This node will * cause extra overhead to for non-gtpu packets which is kept at a minimum. * * @cliexpar * @parblock * Example of graph node before ip4-gtpu-bypass is enabled: * @cliexstart{show vlib graph ip4-gtpu-bypass} * Name Next Previous * ip4-gtpu-bypass error-drop [0] * gtpu4-input [1] * ip4-lookup [2] * @cliexend * * Example of how to enable ip4-gtpu-bypass on an interface: * @cliexcmd{set interface ip gtpu-bypass GigabitEthernet2/0/0} * * Example of graph node after ip4-gtpu-bypass is enabled: * @cliexstart{show vlib graph ip4-gtpu-bypass} * Name Next Previous * ip4-gtpu-bypass error-drop [0] ip4-input * gtpu4-input [1] ip4-input-no-checksum * ip4-lookup [2] * @cliexend * * Example of how to display the feature enabled on an interface: * @cliexstart{show ip interface features GigabitEthernet2/0/0} * IP feature paths configured on GigabitEthernet2/0/0... * ... * ipv4 unicast: * ip4-gtpu-bypass * ip4-lookup * ... * @cliexend * * Example of how to disable ip4-gtpu-bypass on an interface: * @cliexcmd{set interface ip gtpu-bypass GigabitEthernet2/0/0 del} * @endparblock ?*/ /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_interface_ip_gtpu_bypass_command, static) = { .path = "set interface ip gtpu-bypass", .function = set_ip4_gtpu_bypass, .short_help = "set interface ip gtpu-bypass [del]", }; /* *INDENT-ON* */ static clib_error_t * set_ip6_gtpu_bypass (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return set_ip_gtpu_bypass (1, input, cmd); } /*? * This command adds the 'ip6-gtpu-bypass' graph node for a given interface. * By adding the IPv6 gtpu-bypass graph node to an interface, the node checks * for and validate input gtpu packet and bypass ip6-lookup, ip6-local, * ip6-udp-lookup nodes to speedup gtpu packet forwarding. This node will * cause extra overhead to for non-gtpu packets which is kept at a minimum. * * @cliexpar * @parblock * Example of graph node before ip6-gtpu-bypass is enabled: * @cliexstart{show vlib graph ip6-gtpu-bypass} * Name Next Previous * ip6-gtpu-bypass error-drop [0] * gtpu6-input [1] * ip6-lookup [2] * @cliexend * * Example of how to enable ip6-gtpu-bypass on an interface: * @cliexcmd{set interface ip6 gtpu-bypass GigabitEthernet2/0/0} * * Example of graph node after ip6-gtpu-bypass is enabled: * @cliexstart{show vlib graph ip6-gtpu-bypass} * Name Next Previous * ip6-gtpu-bypass error-drop [0] ip6-input * gtpu6-input [1] ip4-input-no-checksum * ip6-lookup [2] * @cliexend * * Example of how to display the feature enabled on an interface: * @cliexstart{show ip interface features GigabitEthernet2/0/0} * IP feature paths configured on GigabitEthernet2/0/0... * ... * ipv6 unicast: * ip6-gtpu-bypass * ip6-lookup * ... * @cliexend * * Example of how to disable ip6-gtpu-bypass on an interface: * @cliexcmd{set interface ip6 gtpu-bypass GigabitEthernet2/0/0 del} * @endparblock ?*/ /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_interface_ip6_gtpu_bypass_command, static) = { .path = "set interface ip6 gtpu-bypass", .function = set_ip6_gtpu_bypass, .short_help = "set interface ip6 gtpu-bypass [del]", }; /* *INDENT-ON* */ int vnet_gtpu_add_del_rx_flow (u32 hw_if_index, u32 t_index, int is_add) { gtpu_main_t *gtm = >pu_main; gtpu_tunnel_t *t = pool_elt_at_index (gtm->tunnels, t_index); vnet_main_t *vnm = vnet_get_main (); if (is_add) { if (t->flow_index == ~0) { vnet_flow_t flow = { .actions = VNET_FLOW_ACTION_REDIRECT_TO_NODE | VNET_FLOW_ACTION_MARK | VNET_FLOW_ACTION_BUFFER_ADVANCE, .mark_flow_id = t_index + gtm->flow_id_start, .redirect_node_index = gtpu4_flow_input_node.index, .buffer_advance = sizeof (ethernet_header_t) + sizeof (ip4_header_t) + sizeof (udp_header_t), .type = VNET_FLOW_TYPE_IP4_GTPU, .ip4_gtpu = { .protocol.prot = IP_PROTOCOL_UDP, .src_addr.addr = t->dst.ip4, .src_addr.mask.as_u32 = ~0, .dst_addr.addr = t->src.ip4, .dst_addr.mask.as_u32 = ~0, .teid = t->teid, } , }; vnet_flow_add (vnm, &flow, &t->flow_index); } return vnet_flow_enable (vnm, t->flow_index, hw_if_index); } /* flow index is removed when the tunnel is deleted */ return vnet_flow_disable (vnm, t->flow_index, hw_if_index); } u32 vnet_gtpu_get_tunnel_index (u32 sw_if_index) { gtpu_main_t *gtm = >pu_main; if (sw_if_index >= vec_len (gtm->tunnel_index_by_sw_if_index)) return ~0; return gtm->tunnel_index_by_sw_if_index[sw_if_index]; } static clib_error_t * gtpu_offload_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; /* Get a line of input. */ if (!unformat_user (input, unformat_line_input, line_input)) return 0; vnet_main_t *vnm = vnet_get_main (); u32 rx_sw_if_index = ~0; u32 hw_if_index = ~0; int is_add = 1; while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) { if (unformat (line_input, "hw %U", unformat_vnet_hw_interface, vnm, &hw_if_index)) continue; if (unformat (line_input, "rx %U", unformat_vnet_sw_interface, vnm, &rx_sw_if_index)) continue; if (unformat (line_input, "del")) { is_add = 0; continue; } return clib_error_return (0, "unknown input `%U'", format_unformat_error, line_input); } if (rx_sw_if_index == ~0) return clib_error_return (0, "missing rx interface"); if (hw_if_index == ~0) return clib_error_return (0, "missing hw interface"); u32 t_index = vnet_gtpu_get_tunnel_index (rx_sw_if_index);; if (t_index == ~0) return clib_error_return (0, "%U is not a gtpu tunnel", format_vnet_sw_if_index_name, vnm, rx_sw_if_index); gtpu_main_t *gtm = >pu_main; gtpu_tunnel_t *t = pool_elt_at_index (gtm->tunnels, t_index); /* first support ipv4 hw offload */ if (!ip46_address_is_ip4 (&t->dst)) return clib_error_return (0, "currently only IPV4 tunnels are supported"); /* inner protocol should be IPv4/IPv6 */ if ((t->decap_next_index != GTPU_INPUT_NEXT_IP4_INPUT) && (t->decap_next_index != GTPU_INPUT_NEXT_IP6_INPUT)) return clib_error_return (0, "currently only inner IPv4/IPv6 protocol is supported"); vnet_hw_interface_t *hw_if = vnet_get_hw_interface (vnm, hw_if_index); ip4_main_t *im = &ip4_main; u32 rx_fib_index = vec_elt (im->fib_index_by_sw_if_index, hw_if->sw_if_index); if (t->encap_fib_index != rx_fib_index) return clib_error_return (0, "interface/tunnel fib mismatch"); if (vnet_gtpu_add_del_rx_flow (hw_if_index, t_index, is_add)) return clib_error_return (0, "error %s flow", is_add ? "enabling" : "disabling"); return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (gtpu_offload_command, static) = { .path = "set flow-offload gtpu", .short_help = "set flow-offload gtpu hw rx [del]", .function = gtpu_offload_command_fn, }; /* *INDENT-ON* */ clib_error_t * gtpu_init (vlib_main_t * vm) { gtpu_main_t *gtm = >pu_main; gtm->vnet_main = vnet_get_main (); gtm->vlib_main = vm; vnet_flow_get_range (gtm->vnet_main, "gtpu", 1024 * 1024, >m->flow_id_start); /* initialize the ip6 hash */ gtm->gtpu6_tunnel_by_key = hash_create_mem (0, sizeof (gtpu6_tunnel_key_t), sizeof (uword)); gtm->vtep_table = vtep_table_create (); gtm->mcast_shared = hash_create_mem (0, sizeof (ip46_address_t), sizeof (mcast_shared_t)); gtm->fib_node_type = fib_node_register_new_type (>pu_vft); return 0; } VLIB_INIT_FUNCTION (gtpu_init); /* *INDENT-OFF* */ VLIB_PLUGIN_REGISTER () = { .version = VPP_BUILD_VER, .description = "GPRS Tunnelling Protocol, User Data (GTPv1-U)", }; /* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */