2 * gre_interface.c: gre interfaces
4 * Copyright (c) 2016 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
19 * @brief L2-GRE over IPSec tunnel interface.
21 * Creates ipsec-gre tunnel interface.
22 * Provides a command line interface so humans can interact with VPP.
25 #include <vnet/vnet.h>
26 #include <vnet/pg/pg.h>
27 #include <vnet/ipsec-gre/ipsec_gre.h>
28 #include <vnet/ip/format.h>
29 #include <vnet/ipsec/ipsec.h>
30 #include <vnet/l2/l2_input.h>
32 #include <vnet/ipsec/esp.h>
35 format_ipsec_gre_tunnel (u8 * s, va_list * args)
37 ipsec_gre_tunnel_t *t = va_arg (*args, ipsec_gre_tunnel_t *);
38 ipsec_gre_main_t *gm = &ipsec_gre_main;
41 "[%d] %U (src) %U (dst) local-sa %d remote-sa %d",
43 format_ip4_address, &t->tunnel_src,
44 format_ip4_address, &t->tunnel_dst,
45 t->local_sa_id, t->remote_sa_id);
50 show_ipsec_gre_tunnel_command_fn (vlib_main_t * vm,
51 unformat_input_t * input,
52 vlib_cli_command_t * cmd)
54 ipsec_gre_main_t *igm = &ipsec_gre_main;
55 ipsec_gre_tunnel_t *t;
57 if (pool_elts (igm->tunnels) == 0)
58 vlib_cli_output (vm, "No IPSec GRE tunnels configured...");
61 pool_foreach (t, igm->tunnels,
63 vlib_cli_output (vm, "%U", format_ipsec_gre_tunnel, t);
71 VLIB_CLI_COMMAND (show_ipsec_gre_tunnel_command, static) = {
72 .path = "show ipsec gre tunnel",
73 .function = show_ipsec_gre_tunnel_command_fn,
77 /* force inclusion from application's main.c */
79 ipsec_gre_interface_init (vlib_main_t * vm)
84 VLIB_INIT_FUNCTION (ipsec_gre_interface_init);
87 * @brief Add or delete ipsec-gre tunnel interface.
89 * @param *a vnet_ipsec_gre_add_del_tunnel_args_t - tunnel interface parameters
90 * @param *sw_if_indexp u32 - software interface index
91 * @return int - 0 if success otherwise <code>VNET_API_ERROR_</code>
94 vnet_ipsec_gre_add_del_tunnel (vnet_ipsec_gre_add_del_tunnel_args_t * a,
97 ipsec_gre_main_t *igm = &ipsec_gre_main;
98 vnet_main_t *vnm = igm->vnet_main;
99 ip4_main_t *im = &ip4_main;
100 ipsec_gre_tunnel_t *t;
101 vnet_hw_interface_t *hi;
102 u32 hw_if_index, sw_if_index;
106 ipsec_add_del_ipsec_gre_tunnel_args_t args;
108 memset (&args, 0, sizeof (args));
109 args.is_add = a->is_add;
110 args.local_sa_id = a->lsa;
111 args.remote_sa_id = a->rsa;
112 args.local_ip.as_u32 = a->src.as_u32;
113 args.remote_ip.as_u32 = a->dst.as_u32;
115 key = (u64) a->src.as_u32 << 32 | (u64) a->dst.as_u32;
116 p = hash_get (igm->tunnel_by_key, key);
120 /* check if same src/dst pair exists */
122 return VNET_API_ERROR_INVALID_VALUE;
124 pool_get_aligned (igm->tunnels, t, CLIB_CACHE_LINE_BYTES);
125 memset (t, 0, sizeof (*t));
127 if (vec_len (igm->free_ipsec_gre_tunnel_hw_if_indices) > 0)
129 vnet_interface_main_t *im = &vnm->interface_main;
131 hw_if_index = igm->free_ipsec_gre_tunnel_hw_if_indices
132 [vec_len (igm->free_ipsec_gre_tunnel_hw_if_indices) - 1];
133 _vec_len (igm->free_ipsec_gre_tunnel_hw_if_indices) -= 1;
135 hi = vnet_get_hw_interface (vnm, hw_if_index);
136 hi->dev_instance = t - igm->tunnels;
137 hi->hw_instance = hi->dev_instance;
139 /* clear old stats of freed tunnel before reuse */
140 sw_if_index = hi->sw_if_index;
141 vnet_interface_counter_lock (im);
142 vlib_zero_combined_counter
143 (&im->combined_sw_if_counters[VNET_INTERFACE_COUNTER_TX],
145 vlib_zero_combined_counter
146 (&im->combined_sw_if_counters[VNET_INTERFACE_COUNTER_RX],
148 vlib_zero_simple_counter
149 (&im->sw_if_counters[VNET_INTERFACE_COUNTER_DROP], sw_if_index);
150 vnet_interface_counter_unlock (im);
154 hw_if_index = vnet_register_interface
155 (vnm, ipsec_gre_device_class.index, t - igm->tunnels,
156 ipsec_gre_hw_interface_class.index, t - igm->tunnels);
157 hi = vnet_get_hw_interface (vnm, hw_if_index);
158 sw_if_index = hi->sw_if_index;
161 t->hw_if_index = hw_if_index;
162 t->sw_if_index = sw_if_index;
163 t->local_sa_id = a->lsa;
164 t->remote_sa_id = a->rsa;
165 t->local_sa = ipsec_get_sa_index_by_sa_id (a->lsa);
166 t->remote_sa = ipsec_get_sa_index_by_sa_id (a->rsa);
168 ip4_sw_interface_enable_disable (sw_if_index, 1);
170 vec_validate_init_empty (igm->tunnel_index_by_sw_if_index,
172 igm->tunnel_index_by_sw_if_index[sw_if_index] = t - igm->tunnels;
174 vec_validate (im->fib_index_by_sw_if_index, sw_if_index);
176 hi->min_packet_bytes = 64 + sizeof (gre_header_t) +
177 sizeof (ip4_header_t) + sizeof (esp_header_t) + sizeof (esp_footer_t);
179 /* Standard default gre MTU. */
180 /* TODO: Should take tunnel overhead into consideration */
181 vnet_sw_interface_set_mtu (vnm, sw_if_index, 9000);
183 clib_memcpy (&t->tunnel_src, &a->src, sizeof (t->tunnel_src));
184 clib_memcpy (&t->tunnel_dst, &a->dst, sizeof (t->tunnel_dst));
186 hash_set (igm->tunnel_by_key, key, t - igm->tunnels);
188 slot = vlib_node_add_named_next_with_slot
189 (vnm->vlib_main, hi->tx_node_index, "esp-encrypt",
190 IPSEC_GRE_OUTPUT_NEXT_ESP_ENCRYPT);
192 ASSERT (slot == IPSEC_GRE_OUTPUT_NEXT_ESP_ENCRYPT);
196 { /* !is_add => delete */
197 /* tunnel needs to exist */
199 return VNET_API_ERROR_NO_SUCH_ENTRY;
201 t = pool_elt_at_index (igm->tunnels, p[0]);
203 sw_if_index = t->sw_if_index;
204 ip4_sw_interface_enable_disable (sw_if_index, 0);
205 vnet_sw_interface_set_flags (vnm, sw_if_index, 0 /* down */ );
206 /* make sure tunnel is removed from l2 bd or xconnect */
207 set_int_l2_mode (igm->vlib_main, vnm, MODE_L3, sw_if_index, 0,
208 L2_BD_PORT_TYPE_NORMAL, 0, 0);
209 vec_add1 (igm->free_ipsec_gre_tunnel_hw_if_indices, t->hw_if_index);
210 igm->tunnel_index_by_sw_if_index[sw_if_index] = ~0;
212 hash_unset (igm->tunnel_by_key, key);
213 pool_put (igm->tunnels, t);
217 *sw_if_indexp = sw_if_index;
219 return ipsec_add_del_ipsec_gre_tunnel (vnm, &args);
222 static clib_error_t *
223 create_ipsec_gre_tunnel_command_fn (vlib_main_t * vm,
224 unformat_input_t * input,
225 vlib_cli_command_t * cmd)
227 unformat_input_t _line_input, *line_input = &_line_input;
230 ip4_address_t src, dst;
231 u32 lsa = 0, rsa = 0;
232 vnet_ipsec_gre_add_del_tunnel_args_t _a, *a = &_a;
235 clib_error_t *error = NULL;
237 /* Get a line of input. */
238 if (!unformat_user (input, unformat_line_input, line_input))
241 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
243 if (unformat (line_input, "del"))
245 else if (unformat (line_input, "src %U", unformat_ip4_address, &src))
247 else if (unformat (line_input, "dst %U", unformat_ip4_address, &dst))
249 else if (unformat (line_input, "local-sa %d", &lsa))
251 else if (unformat (line_input, "remote-sa %d", &rsa))
255 error = clib_error_return (0, "unknown input `%U'",
256 format_unformat_error, line_input);
263 error = clib_error_return (0, "mandatory argument(s) missing");
267 if (memcmp (&src, &dst, sizeof (src)) == 0)
269 error = clib_error_return (0, "src and dst are identical");
273 memset (a, 0, sizeof (*a));
277 clib_memcpy (&a->src, &src, sizeof (src));
278 clib_memcpy (&a->dst, &dst, sizeof (dst));
280 rv = vnet_ipsec_gre_add_del_tunnel (a, &sw_if_index);
285 vlib_cli_output (vm, "%U\n", format_vnet_sw_if_index_name,
286 vnet_get_main (), sw_if_index);
288 case VNET_API_ERROR_INVALID_VALUE:
289 error = clib_error_return (0, "GRE tunnel already exists...");
292 error = clib_error_return (0,
293 "vnet_ipsec_gre_add_del_tunnel returned %d",
299 unformat_free (line_input);
305 VLIB_CLI_COMMAND (create_ipsec_gre_tunnel_command, static) = {
306 .path = "create ipsec gre tunnel",
307 .short_help = "create ipsec gre tunnel src <addr> dst <addr> "
308 "local-sa <id> remote-sa <id> [del]",
309 .function = create_ipsec_gre_tunnel_command_fn,
314 * fd.io coding-style-patch-verification: ON
317 * eval: (c-set-style "gnu")