IPIP: Add IP{v4,v6} over IP{v4,v6} configured tunnel support.

Change-Id: I166301c9e2388bae5f70ec0179d663a2703e27f5
Signed-off-by: Ole Troan <ot@cisco.com>
diff --git a/MAINTAINERS b/MAINTAINERS
index 4fb6759..41f0971 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -139,16 +139,15 @@
 F:	src/plugins/acl/
 F:	src/plugins/acl.am
 
+VNET IPIP
+M:	Ole Troan <otroan@employees.org>
+F:	src/vnet/ipip/
+
 Plugin - flowprobe
 M:	Ole Troan <otroan@employees.org>
 F:	src/plugins/flowprobe/
 F:	src/plugins/flowprobe.am
 
-Plugin - SIXRD
-M:	Ole Troan <ot@cisco.com>
-F:	src/plugins/sixrd/
-F:	src/plugins/sixrd.am
-
 Plugin - GTPU
 M:	Hongjun Ni <hongjun.ni@intel.com>
 F:	src/plugins/gtpu/
diff --git a/src/configure.ac b/src/configure.ac
index cf050b8..74d5113 100644
--- a/src/configure.ac
+++ b/src/configure.ac
@@ -226,7 +226,6 @@
 PLUGIN_ENABLED(memif)
 PLUGIN_ENABLED(pppoe)
 PLUGIN_ENABLED(nat)
-PLUGIN_ENABLED(sixrd)
 PLUGIN_ENABLED(srv6ad)
 PLUGIN_ENABLED(srv6am)
 PLUGIN_ENABLED(srv6as)
diff --git a/src/plugins/Makefile.am b/src/plugins/Makefile.am
index f8b1139..8b46986 100644
--- a/src/plugins/Makefile.am
+++ b/src/plugins/Makefile.am
@@ -83,10 +83,6 @@
 include pppoe.am
 endif
 
-if ENABLE_SIXRD_PLUGIN
-include sixrd.am
-endif
-
 if ENABLE_SRV6AD_PLUGIN
 include srv6_ad.am
 endif
diff --git a/src/plugins/sixrd.am b/src/plugins/sixrd.am
deleted file mode 100644
index 77a4b21..0000000
--- a/src/plugins/sixrd.am
+++ /dev/null
@@ -1,27 +0,0 @@
-# Copyright (c) 2015 Cisco and/or its affiliates.
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at:
-#
-#     http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-libsixrd_plugin_la_SOURCES =			\
-	sixrd/sixrd.c				\
-	sixrd/ip4_sixrd.c
-
-noinst_HEADERS +=				\
-	sixrd/sixrd.h                           \
-	sixrd/sixrd_all_api_h.h \
-	sixrd/sixrd_msg_enum.h
-
-vppplugins_LTLIBRARIES += libsixrd_plugin.la
-
-API_FILES += sixrd/sixrd.api
-
-# vi:syntax=automake
diff --git a/src/plugins/sixrd/ip4_sixrd.c b/src/plugins/sixrd/ip4_sixrd.c
deleted file mode 100644
index f700f14..0000000
--- a/src/plugins/sixrd/ip4_sixrd.c
+++ /dev/null
@@ -1,165 +0,0 @@
-/*---------------------------------------------------------------------------
- * Copyright (c) 2009-2014 Cisco and/or its affiliates.
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at:
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *---------------------------------------------------------------------------
- */
-
-#include "sixrd.h"
-
-vlib_node_registration_t ip4_sixrd_node;
-
-typedef enum {
-  IP4_SIXRD_NEXT_IP6_LOOKUP,
-  IP4_SIXRD_NEXT_DROP,
-  IP4_SIXRD_N_NEXT,
-} ip4_sixrd_next_t;
-
-typedef struct {
-  u32 tunnel_id;
-  u32 length;
-  ip4_address_t src;
-  ip4_address_t dst;
-} sixrd_rx_trace_t;
-
-u8 *
-format_sixrd_rx_trace (u8 * s, va_list * args)
-{
-  CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
-  CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
-  sixrd_rx_trace_t *t = va_arg (*args, sixrd_rx_trace_t *);
-
-  s = format (s, "6RD: tunnel %d len %d src %U dst %U",
-	      t->tunnel_id, clib_net_to_host_u16 (t->length),
-	      format_ip4_address, &t->src, format_ip4_address, &t->dst);
-  return s;
-}
-
-/*
- * ip4_sixrd_sec_check
- */
-static_always_inline void
-ip4_sixrd_sec_check(sixrd_tunnel_t *t, ip4_address_t sa4,
-		    ip6_address_t sa6, u8 *error) {
-  if (PREDICT_FALSE(sixrd_get_addr_net(t, sa6.as_u64[0]) != sa4.as_u32))
-    *error = SIXRD_ERROR_SEC_CHECK;
-}
-
-/*
- * ip4_sixrd
- */
-uword ip4_sixrd(vlib_main_t *vm, vlib_node_runtime_t *node,
-		vlib_frame_t *frame) {
-  u32 n_left_from, *from, next_index, *to_next, n_left_to_next;
-  vlib_node_runtime_t *error_node = vlib_node_get_runtime(vm, ip4_sixrd_node.index);
-  vnet_interface_main_t * im = &vnet_get_main()->interface_main;
-  u32 thread_index = vlib_get_thread_index ();
-
-  from = vlib_frame_vector_args(frame);
-  n_left_from = frame->n_vectors;
-  next_index = node->cached_next_index;
-  while (n_left_from > 0) {
-    vlib_get_next_frame(vm, node, next_index, to_next, n_left_to_next);
-
-    /* Single loop */
-    while (n_left_from > 0 && n_left_to_next > 0) {
-      u32 pi0;
-      vlib_buffer_t *p0;
-      u8 error0 = SIXRD_ERROR_NONE;
-      sixrd_tunnel_t *t0 = 0;
-      ip4_header_t *ip40;
-      ip6_header_t *ip60;
-      u32 tunnel_sw_if_index = ~0;
-      u32 next0 = IP4_SIXRD_NEXT_DROP;
-
-      pi0 = to_next[0] = from[0];
-      from += 1;
-      n_left_from -= 1;
-      to_next += 1;
-      n_left_to_next -= 1;
-
-      p0 = vlib_get_buffer(vm, pi0);
-      ip40 = vlib_buffer_get_current(p0);
-
-      /* Throw away anything that isn't IP in IP. */
-      if (PREDICT_TRUE(ip40->protocol == IP_PROTOCOL_IPV6 && clib_net_to_host_u16(ip40->length) >= 60)) {
-        vlib_buffer_advance(p0, sizeof(ip4_header_t));
-        t0 = ip4_sixrd_get_tunnel(vnet_buffer(p0)->ip.adj_index[VLIB_TX], (ip4_address_t *)&ip40->dst_address, &error0);
-      } else {
-        error0 = SIXRD_ERROR_BAD_PROTOCOL;
-      }
-
-      if (!t0) {
-	error0 = SIXRD_ERROR_NO_TUNNEL;
-	goto error;
-      }
-
-      tunnel_sw_if_index = t0->sw_if_index;
-
-      /* SIXRD inbound security check */
-      if (t0->security_check) {
-	ip60 = vlib_buffer_get_current(p0);
-        ip4_sixrd_sec_check(t0, ip40->src_address, ip60->src_address, &error0);
-      }
-      next0 = error0 == SIXRD_ERROR_NONE ? IP4_SIXRD_NEXT_IP6_LOOKUP
-                                         : IP4_SIXRD_NEXT_DROP;
-
-      if (PREDICT_FALSE(p0->flags & VLIB_BUFFER_IS_TRACED)) {
-        sixrd_rx_trace_t *tr = vlib_add_trace(vm, node, p0, sizeof(*tr));
-        tr->tunnel_id = tunnel_sw_if_index;
-	tr->length = ip40->length;
-	tr->src.as_u32 = ip40->src_address.as_u32;
-	tr->dst.as_u32 = ip40->dst_address.as_u32;
-      }
-
-      error:
-      if (PREDICT_TRUE(error0 == SIXRD_ERROR_NONE)) {
-	u32 len = vlib_buffer_length_in_chain (vm, p0);
-	vlib_increment_combined_counter (im->combined_sw_if_counters
-					 + VNET_INTERFACE_COUNTER_RX,
-					 thread_index,
-					 tunnel_sw_if_index,
-					 1 /* packets */ ,
-					 len /* bytes */ );
-
-	vnet_buffer (p0)->sw_if_index[VLIB_RX] = tunnel_sw_if_index;
-      } else {
-	p0->error = error_node->errors[error0];
-      }
-      vlib_validate_buffer_enqueue_x1(vm, node, next_index, to_next,
-                                      n_left_to_next, pi0, next0);
-    }
-    vlib_put_next_frame(vm, node, next_index, n_left_to_next);
-  }
-  return frame->n_vectors;
-}
-
-static char *sixrd_error_strings[] = {
-#define _(sym, string) string,
-    foreach_sixrd_error
-#undef _
-};
-
-VLIB_REGISTER_NODE(ip4_sixrd_node) = {
-  .function = ip4_sixrd,
-  .name = "ip4-sixrd",
-  .vector_size = sizeof(u32),
-  .format_trace = format_sixrd_rx_trace,
-  .n_errors = SIXRD_N_ERROR,
-  .error_strings = sixrd_error_strings,
-  .n_next_nodes = IP4_SIXRD_N_NEXT,
-  .next_nodes =
-  {
-    [IP4_SIXRD_NEXT_IP6_LOOKUP] = "ip6-lookup",
-    [IP4_SIXRD_NEXT_DROP] = "error-drop",
-  },
-};
diff --git a/src/plugins/sixrd/sixrd.api b/src/plugins/sixrd/sixrd.api
deleted file mode 100644
index 7057bbb..0000000
--- a/src/plugins/sixrd/sixrd.api
+++ /dev/null
@@ -1,44 +0,0 @@
-/*
- * Copyright (c) 2018 Cisco and/or its affiliates.
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at:
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
-option version = "2.0.0";
-
-define sixrd_add_tunnel
-{
-  u32 client_index;
-  u32 context;
-  u32 fib_index;
-  u8 ip6_prefix[16];
-  u8 ip4_prefix[4];
-  u8 ip4_src[4];
-  u8 ip6_prefix_len;
-  u8 ip4_prefix_len;
-  u16 mtu;
-  u8 security_check;
-};
-
-define sixrd_add_tunnel_reply
-{
-  u32 context;
-  u32 sw_if_index;
-  i32 retval;
-};
-
-autoreply define sixrd_del_tunnel
-{
-  u32 client_index;
-  u32 context;
-  u32 sw_if_index;
-};
diff --git a/src/plugins/sixrd/sixrd.c b/src/plugins/sixrd/sixrd.c
deleted file mode 100644
index 66ad19b..0000000
--- a/src/plugins/sixrd/sixrd.c
+++ /dev/null
@@ -1,775 +0,0 @@
-/*
- * Copyright (c) 2018 Cisco and/or its affiliates.
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at:
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-/**
- * This code supports the following sixrd modes:
- *
- * 32 EA bits (Complete IPv4 address is embedded):
- *   ea_bits_len = 32
- * IPv4 suffix is embedded:
- *   ea_bits_len = < 32
- * No embedded address bits (1:1 mode):
- *   ea_bits_len = 0
- */
-
-#include "sixrd.h"
-#include <vnet/plugin/plugin.h>
-#include <vlibapi/api.h>
-#include <vlibmemory/api.h>
-#include <vnet/adj/adj.h>
-#include <vnet/fib/fib_table.h>
-#include <vnet/fib/ip6_fib.h>
-#include <vnet/adj/adj_midchain.h>
-#include <vnet/adj/adj_delegate.h>
-#include <vnet/dpo/lookup_dpo.h>
-#include <vpp/app/version.h>	// Really needed?
-
-/* define message IDs */
-#include "sixrd_msg_enum.h"
-
-/* define message structures */
-#define vl_typedefs
-#include "sixrd_all_api_h.h"
-#undef vl_typedefs
-
-/* define generated endian-swappers */
-#define vl_endianfun
-#include "sixrd_all_api_h.h"
-#undef vl_endianfun
-
-/* instantiate all the print functions we know about */
-#define vl_print(handle, ...) vlib_cli_output(handle, __VA_ARGS__)
-#define vl_printfun
-#include "sixrd_all_api_h.h"
-#undef vl_printfun
-
-/* Get the API version number */
-#define vl_api_version(n, v) static u32 api_version = (v);
-#include "sixrd_all_api_h.h"
-#undef vl_api_version
-
-#define REPLY_MSG_ID_BASE sm->msg_id_base
-#include <vlibapi/api_helper_macros.h>
-
-extern vlib_node_registration_t ip4_sixrd_node;
-
-/**
- * Adj delegate data
- */
-typedef struct sixrd_adj_delegate_t_
-{
-    /**
-     * linkage to the adj
-     */
-  u32 adj_index;
-
-    /**
-     * Linnkage to the FIB node graph
-     */
-  fib_node_t sixrd_node;
-
-    /**
-     * tracking of the IPv4 next-hop
-     */
-  fib_node_index_t sixrd_fib_entry_index;
-
-    /**
-     * sibling on the fib-entry
-     */
-  u32 sixrd_sibling;
-} sixrd_adj_delegate_t;
-
-/**
- * Pool of delegate structs
- */
-static sixrd_adj_delegate_t *sixrd_adj_delegate_pool;
-
-/**
- * Adj delegate registered type
- */
-static adj_delegate_type_t sixrd_adj_delegate_type;
-
-/**
- * FIB node registered type
- */
-static fib_node_type_t sixrd_fib_node_type;
-
-static inline sixrd_adj_delegate_t *
-sixrd_adj_from_base (adj_delegate_t * ad)
-{
-  if (NULL == ad)
-    {
-      return (NULL);
-    }
-  return (pool_elt_at_index (sixrd_adj_delegate_pool, ad->ad_index));
-}
-
-static inline const sixrd_adj_delegate_t *
-sixrd_adj_from_const_base (const adj_delegate_t * ad)
-{
-  if (NULL == ad)
-    {
-      return (NULL);
-    }
-  return (pool_elt_at_index (sixrd_adj_delegate_pool, ad->ad_index));
-}
-
-sixrd_main_t sixrd_main;
-
-static void
-sixrd_fixup (vlib_main_t * vm,
-	     ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
-{
-  ip4_header_t *ip4 = vlib_buffer_get_current (b0);
-  ip6_header_t *ip6 = vlib_buffer_get_current (b0) + sizeof (ip4_header_t);
-  const sixrd_tunnel_t *t = data;
-
-  ip4->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
-  ip4->dst_address.as_u32 =
-    sixrd_get_addr_net (t, ip6->dst_address.as_u64[0]);
-  ip4->checksum = ip4_header_checksum (ip4);
-}
-
-static void
-ip6ip_fixup (vlib_main_t * vm,
-	     ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
-{
-  const sixrd_tunnel_t *t = data;
-  ip4_header_t *ip4 = vlib_buffer_get_current (b0);
-  ip4->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
-  ip4->dst_address.as_u32 =
-    sixrd_get_addr_net (t, adj->sub_type.nbr.next_hop.as_u64[0]);
-  ip4->checksum = ip4_header_checksum (ip4);
-}
-
-static sixrd_tunnel_t *
-find_tunnel_by_sw_if_index (u32 sw_if_index)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  u32 ti = sm->tunnel_index_by_sw_if_index[sw_if_index];
-  if (ti == ~0)
-    {
-      clib_warning ("Not our tunnel\n");
-      return (0);
-    }
-  return pool_elt_at_index (sm->tunnels, ti);
-}
-
-static sixrd_tunnel_t *
-find_tunnel (ip6_address_t * ip6_prefix)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  sixrd_tunnel_t *d;
-
-  /* *INDENT-OFF* */
-  pool_foreach (d, sm->tunnels,
-  ({
-    if (!memcmp (&d->ip6_prefix, ip6_prefix, 16))
-      return d;
-  }));
-  /* *INDENT-ON* */
-  return 0;
-}
-
-
-static u8 *
-sixrd_build_rewrite (vnet_main_t * vnm,
-		     u32 sw_if_index,
-		     vnet_link_t link_type, const void *dst_address)
-{
-  u8 *rewrite = NULL;
-  sixrd_tunnel_t *t;
-
-  t = find_tunnel_by_sw_if_index (sw_if_index);
-  if (!t)
-    {
-      return 0;
-    }
-
-  vec_validate (rewrite, sizeof (ip4_header_t) - 1);
-  ip4_header_t *ip4 = (ip4_header_t *) rewrite;
-  ip4->ip_version_and_header_length = 0x45;
-  ip4->ttl = 64;
-  ip4->protocol = IP_PROTOCOL_IPV6;
-  /* fixup ip4 header length and checksum after-the-fact */
-  ip4->src_address.as_u32 = t->ip4_src.as_u32;
-  ip4->dst_address.as_u32 = 0;
-  ip4->checksum = ip4_header_checksum (ip4);
-
-  return rewrite;
-}
-
-static void
-ip6ip_tunnel_stack (adj_index_t ai, u32 fib_entry_index)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  ip_adjacency_t *adj = adj_get (ai);
-  sixrd_tunnel_t *t;
-  u32 sw_if_index = adj->rewrite_header.sw_if_index;
-
-  if ((vec_len (sm->tunnel_index_by_sw_if_index) < sw_if_index) ||
-      (~0 == sm->tunnel_index_by_sw_if_index[sw_if_index]))
-    return;
-
-  t =
-    pool_elt_at_index (sm->tunnels,
-		       sm->tunnel_index_by_sw_if_index[sw_if_index]);
-
-  /*
-   * find the adjacency that is contributed by the FIB entry
-   * that this tunnel resolves via, and use it as the next adj
-   * in the midchain
-   */
-  if (vnet_hw_interface_get_flags (vnet_get_main (), t->hw_if_index) &
-      VNET_HW_INTERFACE_FLAG_LINK_UP)
-    {
-      adj_nbr_midchain_stack (ai,
-			      fib_entry_contribute_ip_forwarding
-			      (fib_entry_index));
-    }
-  else
-    {
-      adj_nbr_midchain_unstack (ai);
-    }
-}
-
-static void
-sixrd_tunnel_stack (adj_index_t ai, u32 fib_index)
-{
-  dpo_id_t dpo = DPO_INVALID;
-  sixrd_main_t *sm = &sixrd_main;
-  ip_adjacency_t *adj = adj_get (ai);
-  u32 sw_if_index = adj->rewrite_header.sw_if_index;
-
-  if ((vec_len (sm->tunnel_index_by_sw_if_index) < sw_if_index) ||
-      (~0 == sm->tunnel_index_by_sw_if_index[sw_if_index]))
-    return;
-
-  if ((vec_len (sm->tunnel_index_by_sw_if_index) < sw_if_index) ||
-      (sm->tunnel_index_by_sw_if_index[sw_if_index] == ~0))
-    return;
-
-  lookup_dpo_add_or_lock_w_fib_index (fib_index, DPO_PROTO_IP4,
-				      LOOKUP_UNICAST, LOOKUP_INPUT_DST_ADDR,
-				      LOOKUP_TABLE_FROM_CONFIG, &dpo);
-  adj_nbr_midchain_stack (ai, &dpo);
-}
-
-const static ip46_address_t sixrd_special_nh = {
-  .ip6 = {
-	  .as_u64 = {
-		     [0] = 0xffffffffffffffff,
-		     [1] = 0xffffffffffffffff,
-		     },
-	  },
-};
-
-static void
-sixrd_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
-{
-  ip_adjacency_t *adj = adj_get (ai);
-  sixrd_tunnel_t *t = find_tunnel_by_sw_if_index (sw_if_index);
-
-  if (!memcmp (&sixrd_special_nh,
-	       &adj->sub_type.nbr.next_hop, sizeof (sixrd_special_nh)))
-    {
-      adj_nbr_midchain_update_rewrite (ai, sixrd_fixup, t, ADJ_FLAG_NONE,
-				       sixrd_build_rewrite (vnm, sw_if_index,
-							    adj_get_link_type
-							    (ai), NULL));
-      sixrd_tunnel_stack (ai, t->fib_index);
-    }
-  else
-    {
-      sixrd_adj_delegate_t *sixrd_ad;
-      ip4_address_t da4;
-
-      da4.as_u32 =
-	sixrd_get_addr_net (t, adj->sub_type.nbr.next_hop.as_u64[0]);
-
-      fib_prefix_t pfx = {
-	.fp_proto = FIB_PROTOCOL_IP4,
-	.fp_len = 32,
-	.fp_addr = {.ip4 = da4,}
-	,
-      };
-
-      adj_nbr_midchain_update_rewrite
-	(ai, ip6ip_fixup, t,
-	 ADJ_FLAG_NONE,
-	 sixrd_build_rewrite (vnm, sw_if_index,
-			      adj_get_link_type (ai), NULL));
-
-      sixrd_ad =
-	sixrd_adj_from_base (adj_delegate_get (adj, sixrd_adj_delegate_type));
-      if (NULL == sixrd_ad)
-	{
-	  pool_get (sixrd_adj_delegate_pool, sixrd_ad);
-	  fib_node_init (&sixrd_ad->sixrd_node, sixrd_fib_node_type);
-	  sixrd_ad->adj_index = ai;
-	  sixrd_ad->sixrd_fib_entry_index =
-	    fib_table_entry_special_add (t->fib_index, &pfx,
-					 FIB_SOURCE_RR, FIB_ENTRY_FLAG_NONE);
-	  sixrd_ad->sixrd_sibling =
-	    fib_entry_child_add (sixrd_ad->sixrd_fib_entry_index,
-				 sixrd_fib_node_type,
-				 sixrd_ad - sixrd_adj_delegate_pool);
-
-	  adj_delegate_add (adj,
-			    sixrd_adj_delegate_type,
-			    sixrd_ad - sixrd_adj_delegate_pool);
-
-	  ip6ip_tunnel_stack (ai, sixrd_ad->sixrd_fib_entry_index);
-	}
-    }
-}
-
-
-clib_error_t *
-sixrd_interface_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
-{
-  /* Always up */
-  vnet_hw_interface_set_flags (vnm, hw_if_index,
-			       VNET_HW_INTERFACE_FLAG_LINK_UP);
-  return /* no error */ 0;
-}
-
-/* *INDENT-OFF* */
-VNET_HW_INTERFACE_CLASS (sixrd_hw_interface_class) =
-{
-  .name = "ip6ip-6rd",
-  .build_rewrite = sixrd_build_rewrite,
-  .update_adjacency = sixrd_update_adj,
-};
-
-VNET_DEVICE_CLASS (sixrd_device_class) =
-{
-  .name = "ip6ip-6rd",
-  .admin_up_down_function = sixrd_interface_admin_up_down,
-#ifdef SOON
-  .clear counter = 0;
-#endif
-};
-/* *INDENT-ON* */
-
-static int
-sixrd_create_tunnel (ip6_address_t * ip6_prefix, u8 ip6_prefix_len,
-		     ip4_address_t * ip4_prefix, u8 ip4_prefix_len,
-		     ip4_address_t * ip4_src, u16 mtu, bool security_check,
-		     u32 fib_index, u32 * sixrd_tunnel_index)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  sixrd_tunnel_t *t;
-
-  if (fib_index == ~0)
-    return VNET_API_ERROR_NO_SUCH_FIB;
-
-  if ((ip6_prefix_len + 32 - ip4_prefix_len) > 64)
-    return VNET_API_ERROR_INVALID_VALUE;
-
-  /* Tunnel already configured */
-  if (find_tunnel (ip6_prefix))
-    return VNET_API_ERROR_INVALID_VALUE;
-  /* Tunnel already configured for this source */
-  if (find_tunnel_by_ip4_address (ip4_src))
-    return VNET_API_ERROR_INVALID_VALUE;
-
-  /* Get tunnel index */
-  pool_get_aligned (sm->tunnels, t, CLIB_CACHE_LINE_BYTES);
-  memset (t, 0, sizeof (*t));
-  t->tunnel_index = t - sm->tunnels;
-
-  /* Init tunnel struct */
-  t->ip4_prefix.as_u32 = ip4_prefix->as_u32;
-  t->ip4_prefix_len = ip4_prefix_len;
-  t->ip6_prefix = *ip6_prefix;
-  t->ip6_prefix_len = ip6_prefix_len;
-  t->ip4_src = *ip4_src;
-  t->mtu = mtu ? mtu : SIXRD_DEFAULT_MTU;
-  t->security_check = security_check;
-
-  t->shift = (ip4_prefix_len < 32) ?
-    64 - ip6_prefix_len - (32 - ip4_prefix_len) : 0;
-
-  /* Create interface */
-  u32 hw_if_index = vnet_register_interface (vnet_get_main (),
-					     sixrd_device_class.index,
-					     t->tunnel_index,
-					     sixrd_hw_interface_class.index,
-					     t->tunnel_index);
-
-  /* Default the interface to up and enable IPv6 (payload) */
-  vnet_hw_interface_t *hi =
-    vnet_get_hw_interface (vnet_get_main (), hw_if_index);
-  t->hw_if_index = hw_if_index;
-  t->fib_index = fib_index;
-  t->sw_if_index = hi->sw_if_index;
-
-  hi->max_l3_packet_bytes[VLIB_RX] = hi->max_l3_packet_bytes[VLIB_TX] =
-    t->mtu;
-
-  vec_validate_init_empty (sm->tunnel_index_by_sw_if_index, hi->sw_if_index,
-			   ~0);
-  sm->tunnel_index_by_sw_if_index[hi->sw_if_index] = t->tunnel_index;
-
-  hash_set (sm->tunnel_by_ip, ip4_src->as_u32, t->tunnel_index);
-
-  vnet_hw_interface_set_flags (vnet_get_main (), hw_if_index,
-			       VNET_HW_INTERFACE_FLAG_LINK_UP);
-  vnet_sw_interface_set_flags (vnet_get_main (), hi->sw_if_index,
-			       VNET_SW_INTERFACE_FLAG_ADMIN_UP);
-
-  /* Create IPv6 route/adjacency */
-  fib_prefix_t pfx6 = {
-    .fp_proto = FIB_PROTOCOL_IP6,
-    .fp_len = t->ip6_prefix_len,
-    .fp_addr = {.ip6 = t->ip6_prefix,}
-    ,
-  };
-
-  fib_table_entry_update_one_path (fib_index, &pfx6,
-				   FIB_SOURCE_CLI, FIB_ENTRY_FLAG_ATTACHED,
-				   DPO_PROTO_IP6, &sixrd_special_nh,
-				   hi->sw_if_index,
-				   ~0, 1, NULL, FIB_ROUTE_PATH_FLAG_NONE);
-
-  *sixrd_tunnel_index = hi->sw_if_index;
-
-  ip4_register_protocol (IP_PROTOCOL_IPV6, ip4_sixrd_node.index);
-
-  return 0;
-}
-
-/*
- * sixrd_delete_tunnel
- */
-int
-sixrd_delete_tunnel (u32 sw_if_index)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  sixrd_tunnel_t *t = find_tunnel_by_sw_if_index (sw_if_index);
-
-  if (!t)
-    {
-      clib_warning ("SIXRD tunnel delete: tunnel does not exist: %d",
-		    sw_if_index);
-      return -1;
-    }
-
-  fib_prefix_t pfx6 = {
-    .fp_proto = FIB_PROTOCOL_IP6,
-    .fp_len = t->ip6_prefix_len,
-    .fp_addr = {.ip6 = t->ip6_prefix,}
-    ,
-  };
-  fib_table_entry_special_remove (0, &pfx6, FIB_SOURCE_CLI);
-  vnet_sw_interface_set_flags (vnet_get_main (), t->sw_if_index,
-			       0 /* down */ );
-
-  sm->tunnel_index_by_sw_if_index[t->sw_if_index] = ~0;
-
-  hash_unset (sm->tunnel_by_ip, t->ip4_src.as_u32);
-
-  vnet_delete_hw_interface (vnet_get_main (), t->hw_if_index);
-
-  pool_put (sm->tunnels, t);
-
-  return 0;
-}
-
-static clib_error_t *
-sixrd_add_del_tunnel_command_fn (vlib_main_t * vm,
-				 unformat_input_t * input,
-				 vlib_cli_command_t * cmd)
-{
-  unformat_input_t _line_input, *line_input = &_line_input;
-  ip4_address_t ip4_prefix;
-  ip6_address_t ip6_prefix;
-  ip4_address_t ip4_src;
-  u32 ip6_prefix_len = 0, ip4_prefix_len = 0, sixrd_tunnel_index;
-  u32 num_m_args = 0;
-  /* Optional arguments */
-  u32 mtu = 0;
-  u32 fib_index = 0;
-  clib_error_t *error = 0;
-  bool is_add = true, security_check = false;
-
-  /* Get a line of input. */
-  if (!unformat_user (input, unformat_line_input, line_input))
-    return 0;
-  while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
-    {
-      if (unformat (line_input, "del"))
-	is_add = false;
-      if (unformat (line_input, "security-check"))
-	security_check = true;
-      else
-	if (unformat
-	    (line_input, "ip6-pfx %U/%d", unformat_ip6_address, &ip6_prefix,
-	     &ip6_prefix_len))
-	num_m_args++;
-      else if (unformat (line_input, "ip4-pfx %U/%d", unformat_ip4_address,
-			 &ip4_prefix, &ip4_prefix_len))
-	num_m_args++;
-      else
-	if (unformat
-	    (line_input, "ip4-src %U", unformat_ip4_address, &ip4_src))
-	num_m_args++;
-      else if (unformat (line_input, "mtu %d", &mtu))
-	num_m_args++;
-      else if (unformat (line_input, "fib-id %d", &fib_index))
-	;
-      else
-	{
-	  error =
-	    clib_error_return (0, "unknown input `%U'", format_unformat_error,
-			       line_input);
-	  goto done;
-	}
-    }
-
-  if (num_m_args < 3)
-    {
-      error = clib_error_return (0, "mandatory argument(s) missing");
-      goto done;
-    }
-  if (is_add)
-    {
-      int rv = sixrd_create_tunnel (&ip6_prefix, ip6_prefix_len, &ip4_prefix,
-				    ip4_prefix_len, &ip4_src, mtu,
-				    security_check,
-				    fib_index, &sixrd_tunnel_index);
-      if (rv)
-	error = clib_error_return (0, "adding tunnel failed");
-    }
-  else
-    {
-      sixrd_tunnel_t *t = find_tunnel (&ip6_prefix);
-      if (t)
-	{
-	  sixrd_delete_tunnel (t->sw_if_index);
-	}
-    }
-
-done:
-  unformat_free (line_input);
-
-  return error;
-}
-
-/* *INDENT-OFF* */
-VLIB_CLI_COMMAND (sixrd_add_del_tunnel_command, static) =
-{
-  .path = "create 6rd tunnel",
-  .short_help = "create 6rd tunnel ip6-pfx <ip6-pfx> ip4-pfx <ip4-pfx> "
-  "ip4-src <ip4-addr> [del]",
-  .function = sixrd_add_del_tunnel_command_fn,
-};
-/* *INDENT-ON* */
-
-static void
-vl_api_sixrd_add_tunnel_t_handler (vl_api_sixrd_add_tunnel_t * mp)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  vl_api_sixrd_add_tunnel_reply_t *rmp;
-  u32 sixrd_tunnel_index;
-
-  int rv = sixrd_create_tunnel ((ip6_address_t *) & mp->ip6_prefix,
-				mp->ip6_prefix_len,
-				(ip4_address_t *) & mp->ip4_prefix,
-				mp->ip4_prefix_len,
-				(ip4_address_t *) & mp->ip4_src,
-				ntohs (mp->mtu),
-				mp->security_check, ntohl (mp->fib_index),
-				&sixrd_tunnel_index);
-
-  REPLY_MACRO2 (VL_API_SIXRD_ADD_TUNNEL_REPLY, (
-						 {
-						 rmp->sw_if_index =
-						 htonl (sixrd_tunnel_index);
-						 }));
-}
-
-static void
-vl_api_sixrd_del_tunnel_t_handler (vl_api_sixrd_del_tunnel_t * mp)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  vl_api_sixrd_del_tunnel_reply_t *rmp;
-
-  int rv = sixrd_delete_tunnel (ntohl (mp->sw_if_index));
-
-  REPLY_MACRO (VL_API_SIXRD_DEL_TUNNEL_REPLY);
-}
-
-/* List of message types that this plugin understands */
-
-#define foreach_sixrd_plugin_api_msg		\
-_(SIXRD_ADD_TUNNEL, sixrd_add_tunnel)		\
-_(SIXRD_DEL_TUNNEL, sixrd_del_tunnel)
-
-/* *INDENT-OFF* */
-VLIB_PLUGIN_REGISTER() = {
-    .version = VPP_BUILD_VER,
-    .description = "IPv6 Rapid Deployment on IPv4 Infrastructure (RFC5969)",
-};
-/* *INDENT-ON* */
-
-/**
- * @brief Set up the API message handling tables.
- */
-static clib_error_t *
-sixrd_plugin_api_hookup (vlib_main_t * vm)
-{
-  sixrd_main_t *sm = &sixrd_main;
-
-#define _(N, n)                                                                \
-  vl_msg_api_set_handlers((VL_API_##N + sm->msg_id_base), #n,                  \
-                          vl_api_##n##_t_handler, vl_noop_handler,             \
-                          vl_api_##n##_t_endian, vl_api_##n##_t_print,         \
-                          sizeof(vl_api_##n##_t), 1);
-  foreach_sixrd_plugin_api_msg;
-#undef _
-
-  return 0;
-}
-
-#define vl_msg_name_crc_list
-#include "sixrd_all_api_h.h"
-#undef vl_msg_name_crc_list
-
-static void
-setup_message_id_table (sixrd_main_t * sm, api_main_t * am)
-{
-#define _(id, n, crc)                                                          \
-  vl_msg_api_add_msg_name_crc(am, #n "_" #crc, id + sm->msg_id_base);
-  foreach_vl_msg_name_crc_sixrd;
-#undef _
-}
-
-static void
-sixrd_adj_delegate_adj_deleted (adj_delegate_t * aed)
-{
-  sixrd_adj_delegate_t *sixrd_ad;
-
-  sixrd_ad = sixrd_adj_from_base (aed);
-
-  fib_entry_child_remove (sixrd_ad->sixrd_fib_entry_index,
-			  sixrd_ad->sixrd_sibling);
-  fib_table_entry_delete_index (sixrd_ad->sixrd_fib_entry_index,
-				FIB_SOURCE_RR);
-
-  pool_put (sixrd_adj_delegate_pool, sixrd_ad);
-}
-
-static u8 *
-sixrd_adj_delegate_format (const adj_delegate_t * aed, u8 * s)
-{
-  const sixrd_adj_delegate_t *sixrd_ad;
-
-  sixrd_ad = sixrd_adj_from_const_base (aed);
-
-  s = format (s, "SIXRD:[fib-entry:%d]", sixrd_ad->sixrd_fib_entry_index);
-
-  return (s);
-}
-
-static void
-sixrd_fib_node_last_lock_gone (fib_node_t * node)
-{
-  // top of the dependency tree, locks not managed here.
-}
-
-static sixrd_adj_delegate_t *
-sixrd_adj_delegate_from_fib_node (fib_node_t * node)
-{
-  return ((sixrd_adj_delegate_t *) (((char *) node) -
-				    STRUCT_OFFSET_OF (sixrd_adj_delegate_t,
-						      sixrd_node)));
-}
-
-static fib_node_back_walk_rc_t
-sixrd_fib_node_back_walk_notify (fib_node_t * node,
-				 fib_node_back_walk_ctx_t * ctx)
-{
-  sixrd_adj_delegate_t *sixrd_ad;
-
-  sixrd_ad = sixrd_adj_delegate_from_fib_node (node);
-
-  ip6ip_tunnel_stack (sixrd_ad->adj_index, sixrd_ad->sixrd_fib_entry_index);
-
-  return (FIB_NODE_BACK_WALK_CONTINUE);
-}
-
-/**
- * Function definition to get a FIB node from its index
- */
-static fib_node_t *
-sixrd_fib_node_get (fib_node_index_t index)
-{
-  sixrd_adj_delegate_t *sixrd_ad;
-
-  sixrd_ad = pool_elt_at_index (sixrd_adj_delegate_pool, index);
-
-  return (&sixrd_ad->sixrd_node);
-}
-
-/**
- * VFT registered with the adjacency delegate
- */
-const static adj_delegate_vft_t sixrd_adj_delegate_vft = {
-  .adv_adj_deleted = sixrd_adj_delegate_adj_deleted,
-  .adv_format = sixrd_adj_delegate_format,
-};
-
-/**
- * VFT registered with the FIB node for the adj delegate
- */
-const static fib_node_vft_t sixrd_fib_node_vft = {
-  .fnv_get = sixrd_fib_node_get,
-  .fnv_last_lock = sixrd_fib_node_last_lock_gone,
-  .fnv_back_walk = sixrd_fib_node_back_walk_notify,
-};
-
-static clib_error_t *
-sixrd_init (vlib_main_t * vm)
-{
-  sixrd_main_t *sm = &sixrd_main;
-  clib_error_t *error = 0;
-  u8 *name;
-
-  name = format (0, "sixrd_%08x%c", api_version, 0);
-
-  sm->msg_id_base =
-    vl_msg_api_get_msg_ids ((char *) name, VL_MSG_FIRST_AVAILABLE);
-  vec_free (name);
-  error = sixrd_plugin_api_hookup (vm);
-
-  setup_message_id_table (sm, &api_main);
-
-  sixrd_adj_delegate_type =
-    adj_delegate_register_new_type (&sixrd_adj_delegate_vft);
-  sixrd_fib_node_type = fib_node_register_new_type (&sixrd_fib_node_vft);
-
-  return error;
-}
-
-VLIB_INIT_FUNCTION (sixrd_init);
-
-/*
- * fd.io coding-style-patch-verification: ON
- *
- * Local Variables:
- * eval: (c-set-style "gnu")
- * End:
- */
diff --git a/src/plugins/sixrd/sixrd_all_api_h.h b/src/plugins/sixrd/sixrd_all_api_h.h
deleted file mode 100644
index 21111c2..0000000
--- a/src/plugins/sixrd/sixrd_all_api_h.h
+++ /dev/null
@@ -1,16 +0,0 @@
-/*
- * Copyright (c) 2016 Cisco and/or its affiliates.
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at:
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-/* Include the generated file, see BUILT_SOURCES in Makefile.am */
-#include <sixrd/sixrd.api.h>
diff --git a/src/plugins/sixrd/sixrd_msg_enum.h b/src/plugins/sixrd/sixrd_msg_enum.h
deleted file mode 100644
index 46528c1..0000000
--- a/src/plugins/sixrd/sixrd_msg_enum.h
+++ /dev/null
@@ -1,28 +0,0 @@
-/*
- * Copyright (c) 2016 Cisco and/or its affiliates.
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at:
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-#ifndef included_sixrd_msg_enum_h
-#define included_sixrd_msg_enum_h
-
-#include <vppinfra/byte_order.h>
-
-#define vl_msg_id(n,h) n,
-typedef enum {
-#include <sixrd/sixrd_all_api_h.h>
-    /* We'll want to know how many messages IDs we need... */
-    VL_MSG_FIRST_AVAILABLE,
-} vl_msg_id_t;
-#undef vl_msg_id
-
-#endif
diff --git a/src/vnet.am b/src/vnet.am
index a9d984b..8914d9e 100644
--- a/src/vnet.am
+++ b/src/vnet.am
@@ -568,6 +568,21 @@
 API_FILES += vnet/gre/gre.api
 
 ########################################
+# Tunnel protocol: ipip
+########################################
+libvnet_la_SOURCES +=				\
+ vnet/ipip/ipip.c				\
+ vnet/ipip/node.c				\
+ vnet/ipip/sixrd.c				\
+ vnet/ipip/ipip_api.c				\
+ vnet/ipip/ipip_cli.c
+
+nobase_include_HEADERS +=			\
+ vnet/ipip/ipip.h
+
+API_FILES += vnet/ipip/ipip.api
+
+########################################
 # Tunnel protocol: l2tpv3
 ########################################
 libvnet_la_SOURCES +=				\
diff --git a/src/vnet/ip/ip6_packet.h b/src/vnet/ip/ip6_packet.h
index a02f8b2..9916f30 100644
--- a/src/vnet/ip/ip6_packet.h
+++ b/src/vnet/ip/ip6_packet.h
@@ -81,6 +81,7 @@
 #define ip46_address_is_zero(ip46)	(((ip46)->as_u64[0] == 0) && ((ip46)->as_u64[1] == 0))
 #define ip46_address_is_equal(a1, a2)	(((a1)->as_u64[0] == (a2)->as_u64[0]) \
                                          && ((a1)->as_u64[1] == (a2)->as_u64[1]))
+#define ip46_address_initializer {{{ 0 }}}
 
 always_inline ip46_address_t
 to_ip46 (u32 is_ipv6, u8 * buf)
diff --git a/src/vnet/ipip/ipip.api b/src/vnet/ipip/ipip.api
new file mode 100644
index 0000000..988eee5
--- /dev/null
+++ b/src/vnet/ipip/ipip.api
@@ -0,0 +1,101 @@
+/*
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+option version = "1.0.0";
+
+/** \brief Create or delete an IPIP tunnel
+    @param client_index - opaque cookie to identify the sender
+    @param context - sender context, to match reply w/ request
+    @param is_ipv6 - Use 0 for IPv4, 1 for IPv6
+    @param instance - optional unique custom device instance, else ~0.
+    @param src_address - Source IP address
+    @param dst_address - Destination IP address, can be multicast
+    @param fib_index - Encap FIB table ID
+*/
+define ipip_add_tunnel
+{
+  u32 client_index;
+  u32 context;
+  u8 is_ipv6;
+  u32 instance;		/* If non-~0, specifies a custom dev instance */
+  u8 src_address[16];
+  u8 dst_address[16];
+  u32 fib_index;
+};
+
+define ipip_add_tunnel_reply
+{
+  u32 context;
+  i32 retval;
+  u32 sw_if_index;
+};
+
+autoreply define ipip_del_tunnel
+{
+  u32 client_index;
+  u32 context;
+  u32 sw_if_index;
+};
+
+define ipip_6rd_add_tunnel
+{
+  u32 client_index;
+  u32 context;
+  u32 fib_index;
+  u8 ip6_prefix[16];
+  u8 ip4_prefix[4];
+  u8 ip4_src[4];
+  u8 ip6_prefix_len;
+  u8 ip4_prefix_len;
+  u8 security_check;
+};
+
+define ipip_6rd_add_tunnel_reply
+{
+  u32 context;
+  i32 retval;
+  u32 sw_if_index;
+};
+
+autoreply define ipip_6rd_del_tunnel
+{
+  u32 client_index;
+  u32 context;
+  u32 sw_if_index;
+};
+
+define ipip_tunnel_dump
+{
+  u32 client_index;
+  u32 context;
+  u32 sw_if_index;
+};
+
+define ipip_tunnel_details
+{
+  u32 context;
+  u32 sw_if_index;
+  u32 instance;
+  u8 is_ipv6;
+  u8 src_address[16];
+  u8 dst_address[16];
+  u32 fib_index;
+};
+
+/*
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/vnet/ipip/ipip.c b/src/vnet/ipip/ipip.c
new file mode 100644
index 0000000..82c961c
--- /dev/null
+++ b/src/vnet/ipip/ipip.c
@@ -0,0 +1,566 @@
+/*
+ * ipip.c: ipip
+ *
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or aipiped to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <stddef.h>
+#include <vnet/adj/adj_midchain.h>
+#include <vnet/ipip/ipip.h>
+#include <vnet/vnet.h>
+#include <vnet/adj/adj_nbr.h>
+#include <vnet/fib/ip4_fib.h>
+#include <vnet/fib/ip6_fib.h>
+#include <vnet/ip/format.h>
+#include <vnet/ipip/ipip.h>
+
+ipip_main_t ipip_main;
+
+/* Packet trace structure */
+typedef struct
+{
+  u32 tunnel_id;
+  u32 length;
+  ip46_address_t src;
+  ip46_address_t dst;
+} ipip_tx_trace_t;
+
+u8 *
+format_ipip_tx_trace (u8 * s, va_list * args)
+{
+  CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
+  CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
+  ipip_tx_trace_t *t = va_arg (*args, ipip_tx_trace_t *);
+
+  s =
+    format (s, "IPIP: tunnel %d len %d src %U dst %U", t->tunnel_id,
+	    t->length, format_ip46_address, &t->src, IP46_TYPE_ANY,
+	    format_ip46_address, &t->dst, IP46_TYPE_ANY);
+  return s;
+}
+
+static u8 *
+ipip_build_rewrite (vnet_main_t * vnm, u32 sw_if_index,
+		    vnet_link_t link_type, const void *dst_address)
+{
+  ip4_header_t *ip4;
+  ip6_header_t *ip6;
+  u8 *rewrite = NULL;
+  ipip_tunnel_t *t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+
+  if (!t)
+    /* not one of ours */
+    return (0);
+
+  switch (t->transport)
+    {
+    case IPIP_TRANSPORT_IP4:
+      vec_validate (rewrite, sizeof (*ip4) - 1);
+      ip4 = (ip4_header_t *) rewrite;
+      ip4->ip_version_and_header_length = 0x45;
+      ip4->ttl = 64;
+      /* fixup ip4 header length, protocol and checksum after-the-fact */
+      ip4->src_address.as_u32 = t->tunnel_src.ip4.as_u32;
+      ip4->dst_address.as_u32 = t->tunnel_dst.ip4.as_u32;
+      ip4->checksum = ip4_header_checksum (ip4);
+      break;
+
+    case IPIP_TRANSPORT_IP6:
+      vec_validate (rewrite, sizeof (*ip6) - 1);
+      ip6 = (ip6_header_t *) rewrite;
+      ip6->ip_version_traffic_class_and_flow_label =
+	clib_host_to_net_u32 (6 << 28);
+      ip6->hop_limit = 64;
+      /* fixup ip6 header length and protocol after-the-fact */
+      ip6->src_address.as_u64[0] = t->tunnel_src.ip6.as_u64[0];
+      ip6->src_address.as_u64[1] = t->tunnel_src.ip6.as_u64[1];
+      ip6->dst_address.as_u64[0] = t->tunnel_dst.ip6.as_u64[0];
+      ip6->dst_address.as_u64[1] = t->tunnel_dst.ip6.as_u64[1];
+      break;
+    default:
+      /* pass through */
+      ;
+    }
+  return (rewrite);
+}
+
+static void
+ipip4_fixup (vlib_main_t * vm, ip_adjacency_t * adj, vlib_buffer_t * b,
+	     const void *data)
+{
+  ip4_header_t *ip4;
+
+  ip4 = vlib_buffer_get_current (b);
+  ip4->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b));
+  ip4->protocol =
+    adj->ia_link == VNET_LINK_IP6 ? IP_PROTOCOL_IPV6 : IP_PROTOCOL_IP_IN_IP;
+  ip4->checksum = ip4_header_checksum (ip4);
+}
+
+static void
+ipip6_fixup (vlib_main_t * vm, ip_adjacency_t * adj, vlib_buffer_t * b,
+	     const void *data)
+{
+  ip6_header_t *ip6;
+
+  ip6 = vlib_buffer_get_current (b);
+  ip6->payload_length =
+    clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b) -
+			  sizeof (*ip6));
+  ip6->protocol =
+    adj->ia_link == VNET_LINK_IP6 ? IP_PROTOCOL_IPV6 : IP_PROTOCOL_IP_IN_IP;
+}
+
+static void
+ipip_tunnel_stack (adj_index_t ai)
+{
+  ip_adjacency_t *adj;
+  ipip_tunnel_t *t;
+  u32 sw_if_index;
+
+  adj = adj_get (ai);
+  sw_if_index = adj->rewrite_header.sw_if_index;
+
+  t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (!t)
+    return;
+
+  if ((vnet_hw_interface_get_flags (vnet_get_main (), t->hw_if_index) &
+       VNET_HW_INTERFACE_FLAG_LINK_UP) == 0)
+    {
+      adj_nbr_midchain_unstack (ai);
+      return;
+    }
+
+  dpo_id_t tmp = DPO_INVALID;
+  fib_forward_chain_type_t fib_fwd =
+    t->transport ==
+    IPIP_TRANSPORT_IP6 ? FIB_FORW_CHAIN_TYPE_UNICAST_IP6 :
+    FIB_FORW_CHAIN_TYPE_UNICAST_IP4;
+
+  fib_entry_contribute_forwarding (t->p2p.fib_entry_index, fib_fwd, &tmp);
+  if (DPO_LOAD_BALANCE == tmp.dpoi_type)
+    {
+      /*
+       * post IPIP rewrite we will load-balance. However, the IPIP encap
+       * is always the same for this adjacency/tunnel and hence the IP/IPIP
+       * src,dst hash is always the same result too. So we do that hash now and
+       * stack on the choice.
+       * If the choice is an incomplete adj then we will need a poke when
+       * it becomes complete. This happens since the adj update walk propagates
+       * as far a recursive paths.
+       */
+      const dpo_id_t *choice;
+      load_balance_t *lb;
+      int hash;
+
+      lb = load_balance_get (tmp.dpoi_index);
+
+      if (fib_fwd == FIB_FORW_CHAIN_TYPE_UNICAST_IP4)
+	hash = ip4_compute_flow_hash ((ip4_header_t *) adj_get_rewrite (ai),
+				      lb->lb_hash_config);
+      else
+	hash = ip6_compute_flow_hash ((ip6_header_t *) adj_get_rewrite (ai),
+				      lb->lb_hash_config);
+      choice =
+	load_balance_get_bucket_i (lb, hash & lb->lb_n_buckets_minus_1);
+      dpo_copy (&tmp, choice);
+    }
+
+  adj_nbr_midchain_stack (ai, &tmp);
+  dpo_reset (&tmp);
+}
+
+static adj_walk_rc_t
+ipip_adj_walk_cb (adj_index_t ai, void *ctx)
+{
+  ipip_tunnel_stack (ai);
+
+  return (ADJ_WALK_RC_CONTINUE);
+}
+
+static void
+ipip_tunnel_restack (ipip_tunnel_t * gt)
+{
+  fib_protocol_t proto;
+
+  /*
+   * walk all the adjacencies on th IPIP interface and restack them
+   */
+  FOR_EACH_FIB_IP_PROTOCOL (proto)
+  {
+    adj_nbr_walk (gt->sw_if_index, proto, ipip_adj_walk_cb, NULL);
+  }
+}
+
+void
+ipip_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
+{
+  ipip_tunnel_t *t;
+  adj_midchain_fixup_t f;
+
+  t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (!t)
+    return;
+
+  f = t->transport == IPIP_TRANSPORT_IP6 ? ipip6_fixup : ipip4_fixup;
+
+  adj_nbr_midchain_update_rewrite (ai, f, NULL,
+				   (VNET_LINK_ETHERNET ==
+				    adj_get_link_type (ai) ?
+				    ADJ_FLAG_MIDCHAIN_NO_COUNT :
+				    ADJ_FLAG_NONE), ipip_build_rewrite (vnm,
+									sw_if_index,
+									adj_get_link_type
+									(ai),
+									NULL));
+  ipip_tunnel_stack (ai);
+}
+
+static u8 *
+format_ipip_tunnel_name (u8 * s, va_list * args)
+{
+  u32 dev_instance = va_arg (*args, u32);
+  ipip_main_t *gm = &ipip_main;
+  ipip_tunnel_t *t;
+
+  if (dev_instance >= vec_len (gm->tunnels))
+    return format (s, "<improperly-referenced>");
+
+  t = pool_elt_at_index (gm->tunnels, dev_instance);
+  return format (s, "ipip%d", t->user_instance);
+}
+
+static u8 *
+format_ipip_device (u8 * s, va_list * args)
+{
+  u32 dev_instance = va_arg (*args, u32);
+  CLIB_UNUSED (int verbose) = va_arg (*args, int);
+
+  s = format (s, "IPIP tunnel: id %d\n", dev_instance);
+  return s;
+}
+
+static clib_error_t *
+ipip_interface_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
+{
+  vnet_hw_interface_t *hi;
+  ipip_tunnel_t *t;
+
+  hi = vnet_get_hw_interface (vnm, hw_if_index);
+
+  t = ipip_tunnel_db_find_by_sw_if_index (hi->sw_if_index);
+  if (!t)
+    return 0;
+
+  if (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP)
+    vnet_hw_interface_set_flags (vnm, hw_if_index,
+				 VNET_HW_INTERFACE_FLAG_LINK_UP);
+  else
+    vnet_hw_interface_set_flags (vnm, hw_if_index, 0 /* down */ );
+
+  ipip_tunnel_restack (t);
+
+  return /* no error */ 0;
+}
+
+/* *INDENT-OFF* */
+VNET_DEVICE_CLASS(ipip_device_class) = {
+    .name = "IPIP tunnel device",
+    .format_device_name = format_ipip_tunnel_name,
+    .format_device = format_ipip_device,
+    .format_tx_trace = format_ipip_tx_trace,
+    .admin_up_down_function = ipip_interface_admin_up_down,
+#ifdef SOON
+    .clear counter = 0;
+#endif
+};
+
+VNET_HW_INTERFACE_CLASS(ipip_hw_interface_class) = {
+    .name = "IPIP",
+    //.format_header = format_ipip_header_with_length,
+    //.unformat_header = unformat_ipip_header,
+    .build_rewrite = ipip_build_rewrite,
+    .update_adjacency = ipip_update_adj,
+    .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P,
+};
+/* *INDENT-ON* */
+
+ipip_tunnel_t *
+ipip_tunnel_db_find (ipip_tunnel_key_t * key)
+{
+  ipip_main_t *gm = &ipip_main;
+  uword *p;
+
+  p = hash_get_mem (gm->tunnel_by_key, key);
+  if (!p)
+    return (NULL);
+  return (pool_elt_at_index (gm->tunnels, p[0]));
+}
+
+ipip_tunnel_t *
+ipip_tunnel_db_find_by_sw_if_index (u32 sw_if_index)
+{
+  ipip_main_t *gm = &ipip_main;
+  if (vec_len (gm->tunnel_index_by_sw_if_index) < sw_if_index)
+    return NULL;
+  u32 ti = gm->tunnel_index_by_sw_if_index[sw_if_index];
+  if (ti == ~0)
+    return NULL;
+  return pool_elt_at_index (gm->tunnels, ti);
+}
+
+void
+ipip_tunnel_db_add (ipip_tunnel_t * t, ipip_tunnel_key_t * key)
+{
+  ipip_main_t *gm = &ipip_main;
+
+  t->key = clib_mem_alloc (sizeof (*t->key));
+  clib_memcpy (t->key, key, sizeof (*key));
+  hash_set_mem (gm->tunnel_by_key, t->key, t->dev_instance);
+}
+
+void
+ipip_tunnel_db_remove (ipip_tunnel_t * t)
+{
+  ipip_main_t *gm = &ipip_main;
+
+  hash_unset_mem (gm->tunnel_by_key, t->key);
+  clib_mem_free (t->key);
+  t->key = NULL;
+}
+
+static ipip_tunnel_t *
+ipip_tunnel_from_fib_node (fib_node_t * node)
+{
+  ipip_main_t *gm = &ipip_main;
+  ASSERT (gm->fib_node_type == node->fn_type);
+  return ((ipip_tunnel_t *) (((char *) node) -
+			     offsetof (ipip_tunnel_t, p2p.node)));
+}
+
+static fib_node_back_walk_rc_t
+ipip_tunnel_back_walk (fib_node_t * node, fib_node_back_walk_ctx_t * ctx)
+{
+  ipip_tunnel_restack (ipip_tunnel_from_fib_node (node));
+
+  return (FIB_NODE_BACK_WALK_CONTINUE);
+}
+
+static fib_node_t *
+ipip_tunnel_fib_node_get (fib_node_index_t index)
+{
+  ipip_tunnel_t *gt;
+  ipip_main_t *gm;
+
+  gm = &ipip_main;
+  gt = pool_elt_at_index (gm->tunnels, index);
+
+  return (&gt->p2p.node);
+}
+
+static void
+ipip_tunnel_last_lock_gone (fib_node_t * node)
+{
+  /*
+   * The MPLS IPIP tunnel is a root of the graph. As such
+   * it never has children and thus is never locked.
+   */
+  ASSERT (0);
+}
+
+/*
+ * Virtual function table registered by IPIP tunnels
+ * for participation in the FIB object graph.
+ */
+const static fib_node_vft_t ipip_vft = {
+  .fnv_get = ipip_tunnel_fib_node_get,
+  .fnv_last_lock = ipip_tunnel_last_lock_gone,
+  .fnv_back_walk = ipip_tunnel_back_walk,
+};
+
+static void
+ipip_fib_add (ipip_tunnel_t * t)
+{
+  ipip_main_t *gm = &ipip_main;
+  fib_prefix_t dst = {.fp_len = t->transport == IPIP_TRANSPORT_IP6 ? 128 : 32,
+    .fp_proto =
+      t->transport ==
+      IPIP_TRANSPORT_IP6 ? FIB_PROTOCOL_IP6 : FIB_PROTOCOL_IP4,
+    .fp_addr = t->tunnel_dst
+  };
+
+  t->p2p.fib_entry_index =
+    fib_table_entry_special_add (t->fib_index, &dst, FIB_SOURCE_RR,
+				 FIB_ENTRY_FLAG_NONE);
+  t->p2p.sibling_index =
+    fib_entry_child_add (t->p2p.fib_entry_index, gm->fib_node_type,
+			 t->dev_instance);
+}
+
+static void
+ipip_fib_delete (ipip_tunnel_t * t)
+{
+  fib_entry_child_remove (t->p2p.fib_entry_index, t->p2p.sibling_index);
+  fib_table_entry_delete_index (t->p2p.fib_entry_index, FIB_SOURCE_RR);
+  fib_node_deinit (&t->p2p.node);
+}
+
+int
+ipip_add_tunnel (ipip_transport_t transport,
+		 u32 instance, ip46_address_t * src, ip46_address_t * dst,
+		 u32 fib_index, u32 * sw_if_indexp)
+{
+  ipip_main_t *gm = &ipip_main;
+  vnet_main_t *vnm = gm->vnet_main;
+  ip4_main_t *im4 = &ip4_main;
+  ip6_main_t *im6 = &ip6_main;
+  ipip_tunnel_t *t;
+  vnet_hw_interface_t *hi;
+  u32 hw_if_index, sw_if_index;
+  ipip_tunnel_key_t key = {.transport = transport,
+    .fib_index = fib_index,
+    .src = *src,
+    .dst = *dst
+  };
+  t = ipip_tunnel_db_find (&key);
+  if (t)
+    return VNET_API_ERROR_IF_ALREADY_EXISTS;
+
+  pool_get_aligned (gm->tunnels, t, CLIB_CACHE_LINE_BYTES);
+  memset (t, 0, sizeof (*t));
+
+  /* Reconcile the real dev_instance and a possible requested instance */
+  u32 t_idx = t - gm->tunnels;	/* tunnel index (or instance) */
+  u32 u_idx = instance;		/* user specified instance */
+  if (u_idx == ~0)
+    u_idx = t_idx;
+  if (hash_get (gm->instance_used, u_idx))
+    {
+      pool_put (gm->tunnels, t);
+      return VNET_API_ERROR_INSTANCE_IN_USE;
+    }
+  hash_set (gm->instance_used, u_idx, 1);
+
+  t->dev_instance = t_idx;	/* actual */
+  t->user_instance = u_idx;	/* name */
+  fib_node_init (&t->p2p.node, gm->fib_node_type);
+
+  hw_if_index = vnet_register_interface (vnm, ipip_device_class.index, t_idx,
+					 ipip_hw_interface_class.index,
+					 t_idx);
+
+  hi = vnet_get_hw_interface (vnm, hw_if_index);
+  sw_if_index = hi->sw_if_index;
+
+  t->hw_if_index = hw_if_index;
+  t->fib_index = fib_index;
+  t->sw_if_index = sw_if_index;
+
+  t->transport = transport;
+  vec_validate_init_empty (gm->tunnel_index_by_sw_if_index, sw_if_index, ~0);
+  gm->tunnel_index_by_sw_if_index[sw_if_index] = t_idx;
+
+  if (t->transport == IPIP_TRANSPORT_IP4)
+    {
+      vec_validate (im4->fib_index_by_sw_if_index, sw_if_index);
+      hi->min_packet_bytes = 64 + sizeof (ip4_header_t);
+    }
+  else
+    {
+      vec_validate (im6->fib_index_by_sw_if_index, sw_if_index);
+      hi->min_packet_bytes = 64 + sizeof (ip6_header_t);
+    }
+
+  hi->per_packet_overhead_bytes = /* preamble */ 8 + /* inter frame gap */ 12;
+
+  /* Standard default ipip MTU. */
+  hi->max_l3_packet_bytes[VLIB_RX] = hi->max_l3_packet_bytes[VLIB_TX] = 9000;
+
+  t->tunnel_src = *src;
+  t->tunnel_dst = *dst;
+
+  ipip_tunnel_db_add (t, &key);
+
+  /*
+   * Source the FIB entry for the tunnel's destination and become a
+   * child thereof. The tunnel will then get poked when the forwarding
+   * for the entry updates, and the tunnel can re-stack accordingly
+   */
+  ipip_fib_add (t);
+  if (sw_if_indexp)
+    *sw_if_indexp = sw_if_index;
+
+  if (t->transport == IPIP_TRANSPORT_IP6 && !gm->ip6_protocol_registered)
+    {
+      ip6_register_protocol (IP_PROTOCOL_IP_IN_IP, ipip6_input_node.index);
+      ip6_register_protocol (IP_PROTOCOL_IPV6, ipip6_input_node.index);
+      gm->ip6_protocol_registered = true;
+    }
+  else if (t->transport == IPIP_TRANSPORT_IP4 && !gm->ip4_protocol_registered)
+    {
+      ip4_register_protocol (IP_PROTOCOL_IP_IN_IP, ipip4_input_node.index);
+      ip4_register_protocol (IP_PROTOCOL_IPV6, ipip4_input_node.index);
+      gm->ip4_protocol_registered = true;
+    }
+  return 0;
+}
+
+int
+ipip_del_tunnel (u32 sw_if_index)
+{
+  ipip_main_t *gm = &ipip_main;
+  vnet_main_t *vnm = gm->vnet_main;
+  ipip_tunnel_t *t;
+
+
+  t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (t == NULL)
+    return VNET_API_ERROR_NO_SUCH_ENTRY;
+
+  vnet_sw_interface_set_flags (vnm, sw_if_index, 0 /* down */ );
+  gm->tunnel_index_by_sw_if_index[sw_if_index] = ~0;
+  vnet_delete_hw_interface (vnm, t->hw_if_index);
+  ipip_fib_delete (t);
+  hash_unset (gm->instance_used, t->user_instance);
+  ipip_tunnel_db_remove (t);
+  pool_put (gm->tunnels, t);
+
+  return 0;
+}
+
+static clib_error_t *
+ipip_init (vlib_main_t * vm)
+{
+  ipip_main_t *gm = &ipip_main;
+
+  memset (gm, 0, sizeof (gm[0]));
+  gm->vlib_main = vm;
+  gm->vnet_main = vnet_get_main ();
+  gm->tunnel_by_key =
+    hash_create_mem (0, sizeof (ipip_tunnel_key_t), sizeof (uword));
+  gm->fib_node_type = fib_node_register_new_type (&ipip_vft);
+
+  return 0;
+}
+
+VLIB_INIT_FUNCTION (ipip_init);
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/vnet/ipip/ipip.h b/src/vnet/ipip/ipip.h
new file mode 100644
index 0000000..e9277d8
--- /dev/null
+++ b/src/vnet/ipip/ipip.h
@@ -0,0 +1,168 @@
+/*
+ * ipip.h: types/functions for ipip.
+ *
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or aipiped to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#ifndef included_ipip_h
+#define included_ipip_h
+
+#include <vnet/adj/adj_types.h>
+#include <vnet/ip/ip6_packet.h>
+#include <vnet/ip/format.h>
+#include <vnet/ip/ip.h>
+#include <vnet/vnet.h>
+
+extern vnet_hw_interface_class_t ipip_hw_interface_class;
+
+#define foreach_ipip_error			\
+  /* Must be first. */				\
+  _(DECAP_PKTS, "packets decapsulated")		\
+  _(BAD_PROTOCOL, "bad protocol")		\
+  _(NO_TUNNEL, "no tunnel")
+
+typedef enum
+{
+#define _(sym, str) IPIP_ERROR_##sym,
+  foreach_ipip_error
+#undef _
+    IPIP_N_ERROR,
+} ipip_error_t;
+
+/**
+ * @brief IPIP Tunnel key
+ */
+typedef enum
+{
+  IPIP_TRANSPORT_IP4,
+  IPIP_TRANSPORT_IP6,
+} ipip_transport_t;
+
+typedef struct
+{
+  ipip_transport_t transport;
+  u32 fib_index;
+  ip46_address_t src;
+  ip46_address_t dst;
+} __attribute__ ((packed)) ipip_tunnel_key_t;
+
+typedef enum
+{
+  IPIP_MODE_P2P = 0,
+  IPIP_MODE_6RD,
+} ipip_mode_t;
+
+/**
+ * @brief A representation of a IPIP tunnel
+ */
+typedef struct
+{
+  ipip_mode_t mode;
+  ipip_transport_t transport;
+  ipip_tunnel_key_t *key;
+  ip46_address_t tunnel_src;
+  ip46_address_t tunnel_dst;
+  u32 fib_index;
+  u32 hw_if_index;
+  u32 sw_if_index;
+  u32 dev_instance;		/* Real device instance in tunnel vector */
+  u32 user_instance;		/* Instance name being shown to user */
+
+  union
+  {
+    struct
+    {
+      fib_node_t node;
+      fib_node_index_t fib_entry_index;
+      u32 sibling_index;
+    } p2p;
+    struct
+    {
+      ip6_address_t ip6_prefix;
+      ip4_address_t ip4_prefix;
+      u8 ip6_prefix_len;
+      u8 ip4_prefix_len;
+      u8 shift;
+      bool security_check;
+    } sixrd;
+  };
+} ipip_tunnel_t;
+
+typedef struct
+{
+  ipip_tunnel_t *tunnels;
+  uword *tunnel_by_key;
+  u32 *tunnel_index_by_sw_if_index;
+  fib_node_type_t fib_node_type;
+
+  /* convenience */
+  vlib_main_t *vlib_main;
+  vnet_main_t *vnet_main;
+
+  /* Record used instances */
+  uword *instance_used;
+
+  bool ip4_protocol_registered;
+  bool ip6_protocol_registered;
+} ipip_main_t;
+
+extern ipip_main_t ipip_main;
+extern vlib_node_registration_t ipip4_input_node;
+extern vlib_node_registration_t ipip6_input_node;
+
+/*
+ * sixrd_get_addr_net
+ */
+static_always_inline u32
+sixrd_get_addr_net (const ipip_tunnel_t * t, u64 dal)
+{
+  /* 1:1 mode */
+  if (t->sixrd.ip4_prefix_len == 32)
+    return (t->sixrd.ip4_prefix.as_u32);
+
+  dal = clib_net_to_host_u64 (dal);
+
+  /* Grab 32 - ip4_prefix_len bits out of IPv6 address from offset
+   * ip6_prefix_len */
+  u32 mask = ~(~0ULL << (32 - t->sixrd.ip4_prefix_len));
+  u32 ip4 =
+    clib_net_to_host_u32 (t->sixrd.
+			  ip4_prefix.as_u32) | ((u32) (dal >> t->sixrd.
+						       shift) & mask);
+  return clib_host_to_net_u32 (ip4);
+}
+
+int ipip_add_tunnel (ipip_transport_t transport, u32 instance,
+		     ip46_address_t * src, ip46_address_t * dst,
+		     u32 fib_index, u32 * sw_if_indexp);
+int ipip_del_tunnel (u32 sw_if_index);
+int sixrd_add_tunnel (ip6_address_t * ip6_prefix, u8 ip6_prefix_len,
+		      ip4_address_t * ip4_prefix, u8 ip4_prefix_len,
+		      ip4_address_t * ip4_src, bool security_check,
+		      u32 fib_index, u32 * sw_if_index);
+int sixrd_del_tunnel (u32 sw_if_index);
+void ipip_tunnel_db_add (ipip_tunnel_t * t, ipip_tunnel_key_t * key);
+void ipip_tunnel_db_remove (ipip_tunnel_t * t);
+ipip_tunnel_t *ipip_tunnel_db_find (ipip_tunnel_key_t * key);
+ipip_tunnel_t *ipip_tunnel_db_find_by_sw_if_index (u32 sw_if_index);
+
+#endif
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/vnet/ipip/ipip_api.c b/src/vnet/ipip/ipip_api.c
new file mode 100644
index 0000000..a663329
--- /dev/null
+++ b/src/vnet/ipip/ipip_api.c
@@ -0,0 +1,230 @@
+/*
+ * ipip_api.c - ipip api
+ *
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <vlibmemory/api.h>
+#include <vnet/api_errno.h>
+#include <vnet/fib/fib_table.h>
+#include <vnet/interface.h>
+#include <vnet/ipip/ipip.h>
+#include <vnet/vnet.h>
+#include <vnet/vnet_msg_enum.h>
+
+#define vl_typedefs		/* define message structures */
+#include <vnet/vnet_all_api_h.h>
+#undef vl_typedefs
+
+#define vl_endianfun		/* define message structures */
+#include <vnet/vnet_all_api_h.h>
+#undef vl_endianfun
+
+/* instantiate all the print functions we know about */
+#define vl_print(handle, ...) vlib_cli_output(handle, __VA_ARGS__)
+#define vl_printfun
+#include <vnet/vnet_all_api_h.h>
+#undef vl_printfun
+
+#include <vlibapi/api_helper_macros.h>
+
+#define foreach_vpe_api_msg			\
+  _(IPIP_ADD_TUNNEL, ipip_add_tunnel)		\
+  _(IPIP_DEL_TUNNEL, ipip_del_tunnel)		\
+  _(IPIP_6RD_ADD_TUNNEL, ipip_6rd_add_tunnel)	\
+  _(IPIP_6RD_DEL_TUNNEL, ipip_6rd_del_tunnel)	\
+  _(IPIP_TUNNEL_DUMP, ipip_tunnel_dump)
+
+static void
+vl_api_ipip_add_tunnel_t_handler (vl_api_ipip_add_tunnel_t * mp)
+{
+  vl_api_ipip_add_tunnel_reply_t *rmp;
+  int rv = 0;
+  u32 sw_if_index = ~0;
+  ip46_address_t src = ip46_address_initializer, dst =
+    ip46_address_initializer;
+
+  /* ip addresses sent in network byte order */
+  if (mp->is_ipv6)
+    {
+      clib_memcpy (&src.ip6, mp->src_address, 16);
+      clib_memcpy (&dst.ip6, mp->dst_address, 16);
+    }
+  else
+    {
+      clib_memcpy (&src.ip4, mp->src_address, 4);
+      clib_memcpy (&dst.ip4, mp->dst_address, 4);
+    }
+
+  rv = ipip_add_tunnel (mp->is_ipv6 ? IPIP_TRANSPORT_IP6 : IPIP_TRANSPORT_IP4,
+			ntohl (mp->instance), &src, &dst,
+			ntohl (mp->fib_index), &sw_if_index);
+
+  /* *INDENT-OFF* */
+  REPLY_MACRO2(VL_API_IPIP_ADD_TUNNEL_REPLY,
+               ({ rmp->sw_if_index = ntohl(sw_if_index); }));
+  /* *INDENT-ON* */
+}
+
+static void
+vl_api_ipip_del_tunnel_t_handler (vl_api_ipip_del_tunnel_t * mp)
+{
+  vl_api_ipip_del_tunnel_reply_t *rmp;
+
+  int rv = ipip_del_tunnel (ntohl (mp->sw_if_index));
+
+  REPLY_MACRO (VL_API_IPIP_DEL_TUNNEL_REPLY);
+}
+
+static void
+send_ipip_tunnel_details (ipip_tunnel_t * t,
+			  vl_api_registration_t * reg, u32 context)
+{
+  vl_api_ipip_tunnel_details_t *rmp;
+  bool is_ipv6 = t->transport == IPIP_TRANSPORT_IP6 ? true : false;
+  fib_table_t *ft;
+
+  rmp = vl_msg_api_alloc (sizeof (*rmp));
+  memset (rmp, 0, sizeof (*rmp));
+  rmp->_vl_msg_id = htons (VL_API_IPIP_TUNNEL_DETAILS);
+  if (is_ipv6)
+    {
+      clib_memcpy (rmp->src_address, &t->tunnel_src.ip6.as_u8, 16);
+      clib_memcpy (rmp->dst_address, &t->tunnel_dst.ip6.as_u8, 16);
+      ft = fib_table_get (t->fib_index, FIB_PROTOCOL_IP6);
+      rmp->fib_index = htonl (ft->ft_table_id);
+    }
+  else
+    {
+      clib_memcpy (rmp->src_address, &t->tunnel_src.ip4.as_u8, 4);
+      clib_memcpy (rmp->dst_address, &t->tunnel_dst.ip4.as_u8, 4);
+      ft = fib_table_get (t->fib_index, FIB_PROTOCOL_IP4);
+      rmp->fib_index = htonl (ft->ft_table_id);
+    }
+  rmp->instance = htonl (t->user_instance);
+  rmp->sw_if_index = htonl (t->sw_if_index);
+  rmp->context = context;
+  rmp->is_ipv6 = is_ipv6;
+
+  vl_api_send_msg (reg, (u8 *) rmp);
+}
+
+static void
+vl_api_ipip_tunnel_dump_t_handler (vl_api_ipip_tunnel_dump_t * mp)
+{
+  vl_api_registration_t *reg;
+  ipip_main_t *gm = &ipip_main;
+  ipip_tunnel_t *t;
+  u32 sw_if_index;
+
+  reg = vl_api_client_index_to_registration (mp->client_index);
+  if (!reg)
+    return;
+
+  sw_if_index = ntohl (mp->sw_if_index);
+
+  if (sw_if_index == ~0)
+    {
+    /* *INDENT-OFF* */
+    pool_foreach(t, gm->tunnels,
+                 ({ send_ipip_tunnel_details(t, reg, mp->context); }));
+    /* *INDENT-ON* */
+    }
+  else
+    {
+      t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+      if (t)
+	send_ipip_tunnel_details (t, reg, mp->context);
+    }
+}
+
+static void
+vl_api_ipip_6rd_add_tunnel_t_handler (vl_api_ipip_6rd_add_tunnel_t * mp)
+{
+  vl_api_ipip_6rd_add_tunnel_reply_t *rmp;
+  u32 sixrd_tunnel_index;
+
+  int rv = sixrd_add_tunnel ((ip6_address_t *) & mp->ip6_prefix,
+			     mp->ip6_prefix_len,
+			     (ip4_address_t *) & mp->ip4_prefix,
+			     mp->ip4_prefix_len,
+			     (ip4_address_t *) & mp->ip4_src,
+			     mp->security_check,
+			     ntohl (mp->fib_index), &sixrd_tunnel_index);
+
+  REPLY_MACRO2 (VL_API_IPIP_6RD_ADD_TUNNEL_REPLY, (
+						    {
+						    rmp->sw_if_index =
+						    htonl
+						    (sixrd_tunnel_index);}));
+}
+
+static void
+vl_api_ipip_6rd_del_tunnel_t_handler (vl_api_ipip_6rd_del_tunnel_t * mp)
+{
+  vl_api_ipip_6rd_del_tunnel_reply_t *rmp;
+
+  int rv = sixrd_del_tunnel (ntohl (mp->sw_if_index));
+
+  REPLY_MACRO (VL_API_IPIP_6RD_DEL_TUNNEL_REPLY);
+}
+
+/*
+ * ipip_api_hookup
+ * Add vpe's API message handlers to the table.
+ * vlib has alread mapped shared memory and
+ * added the client registration handlers.
+ * See .../vlib-api/vlibmemory/memclnt_vlib.c:memclnt_process()
+ */
+#define vl_msg_name_crc_list
+#include <vnet/vnet_all_api_h.h>
+#undef vl_msg_name_crc_list
+
+static void
+setup_message_id_table (api_main_t * am)
+{
+#define _(id, n, crc) vl_msg_api_add_msg_name_crc(am, #n "_" #crc, id);
+  foreach_vl_msg_name_crc_ipip;
+#undef _
+}
+
+static clib_error_t *
+ipip_api_hookup (vlib_main_t * vm)
+{
+  api_main_t *am = &api_main;
+
+#define _(N, n)                                                                \
+  vl_msg_api_set_handlers(VL_API_##N, #n, vl_api_##n##_t_handler,              \
+                          vl_noop_handler, vl_api_##n##_t_endian,              \
+                          vl_api_##n##_t_print, sizeof(vl_api_##n##_t), 1);
+  foreach_vpe_api_msg;
+#undef _
+
+  /*
+   * Set up the (msg_name, crc, message-id) table
+   */
+  setup_message_id_table (am);
+
+  return 0;
+}
+
+VLIB_API_INIT_FUNCTION (ipip_api_hookup);
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/vnet/ipip/ipip_cli.c b/src/vnet/ipip/ipip_cli.c
new file mode 100644
index 0000000..45e6451
--- /dev/null
+++ b/src/vnet/ipip/ipip_cli.c
@@ -0,0 +1,318 @@
+/*
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "ipip.h"
+#include <vppinfra/error.h>
+#include <vnet/vnet.h>
+
+static clib_error_t *create_ipip_tunnel_command_fn(vlib_main_t *vm,
+                                                   unformat_input_t *input,
+                                                   vlib_cli_command_t *cmd) {
+  unformat_input_t _line_input, *line_input = &_line_input;
+  ip46_address_t src = ip46_address_initializer, dst = ip46_address_initializer;
+  u32 instance = ~0;
+  u32 fib_index = 0;
+  int rv;
+  u32 num_m_args = 0;
+  u32 sw_if_index;
+  clib_error_t *error = NULL;
+  bool ip4_set = false, ip6_set = false;
+
+  /* Get a line of input. */
+  if (!unformat_user(input, unformat_line_input, line_input))
+    return 0;
+
+  while (unformat_check_input(line_input) != UNFORMAT_END_OF_INPUT) {
+    if (unformat(line_input, "instance %d", &instance))
+      ;
+    else if (unformat(line_input, "src %U", unformat_ip4_address, &src.ip4)) {
+      num_m_args++;
+      ip4_set = true;
+    } else if (unformat(line_input, "dst %U", unformat_ip4_address, &dst.ip4)) {
+      num_m_args++;
+      ip4_set = true;
+    } else if (unformat(line_input, "src %U", unformat_ip6_address, &src.ip6)) {
+      num_m_args++;
+      ip6_set = true;
+    } else if (unformat(line_input, "dst %U", unformat_ip6_address, &dst.ip6)) {
+      num_m_args++;
+      ip6_set = true;
+    } else if (unformat(line_input, "outer-fib-id %d", &fib_index))
+      ;
+    else {
+      error = clib_error_return(0, "unknown input `%U'", format_unformat_error,
+                                line_input);
+      goto done;
+    }
+  }
+
+  if (num_m_args < 2) {
+    error = clib_error_return(0, "mandatory argument(s) missing");
+    goto done;
+  } 
+  if (ip4_set && ip6_set) {
+    error = clib_error_return(0, "source and destination must be of same address family");
+    goto done;
+  }
+
+  rv = ipip_add_tunnel(ip6_set ? IPIP_TRANSPORT_IP6 : IPIP_TRANSPORT_IP4,
+		       instance,
+		       &src,
+		       &dst,
+		       fib_index,
+		       &sw_if_index);
+
+  switch (rv) {
+  case 0:
+    vlib_cli_output(vm, "%U\n", format_vnet_sw_if_index_name, vnet_get_main(),
+                    sw_if_index);
+    break;
+  case VNET_API_ERROR_IF_ALREADY_EXISTS:
+    error = clib_error_return(0, "IPIP tunnel already exists...");
+    goto done;
+  case VNET_API_ERROR_NO_SUCH_FIB:
+    error = clib_error_return(0, "outer fib ID %d doesn't exist\n", fib_index);
+    goto done;
+  case VNET_API_ERROR_NO_SUCH_ENTRY:
+    error = clib_error_return(0, "IPIP tunnel doesn't exist");
+    goto done;
+  case VNET_API_ERROR_INSTANCE_IN_USE:
+    error = clib_error_return(0, "Instance is in use");
+    goto done;
+  default:
+    error = clib_error_return(0, "vnet_ipip_add_del_tunnel returned %d", rv);
+    goto done;
+  }
+
+done:
+  unformat_free(line_input);
+
+  return error;
+}
+
+static clib_error_t *delete_ipip_tunnel_command_fn(vlib_main_t *vm,
+                                                   unformat_input_t *input,
+                                                   vlib_cli_command_t *cmd) {
+  unformat_input_t _line_input, *line_input = &_line_input;
+  int rv;
+  u32 num_m_args = 0;
+  u32 sw_if_index = ~0;
+  clib_error_t *error = NULL;
+
+  /* Get a line of input. */
+  if (!unformat_user(input, unformat_line_input, line_input))
+    return 0;
+
+  while (unformat_check_input(line_input) != UNFORMAT_END_OF_INPUT) {
+    if (unformat(line_input, "sw_if_index %d", &sw_if_index))
+      num_m_args++;
+    else {
+      error = clib_error_return(0, "unknown input `%U'", format_unformat_error,
+                                line_input);
+      goto done;
+    }
+  }
+
+  if (num_m_args < 1) {
+    error = clib_error_return(0, "mandatory argument(s) missing");
+    goto done;
+  } 
+
+  rv = ipip_del_tunnel(sw_if_index);
+  printf("RV %d\n", rv);
+
+done:
+  unformat_free(line_input);
+
+  return error;
+}
+
+/* *INDENT-OFF* */
+VLIB_CLI_COMMAND(create_ipip_tunnel_command, static) = {
+    .path = "create ipip tunnel",
+    .short_help = "create ipip tunnel src <addr> dst <addr> [instance <n>] "
+                  "[outer-fib-id <fib>]",
+    .function = create_ipip_tunnel_command_fn,
+};
+VLIB_CLI_COMMAND(delete_ipip_tunnel_command, static) = {
+    .path = "delete ipip tunnel",
+    .short_help = "delete ipip tunnel sw_if_index <sw_if_index ",
+    .function = delete_ipip_tunnel_command_fn,
+};
+/* *INDENT-ON* */
+
+static u8 *format_ipip_tunnel(u8 *s, va_list *args) {
+  ipip_tunnel_t *t = va_arg(*args, ipip_tunnel_t *);
+
+  ip46_type_t type = (t->transport == IPIP_TRANSPORT_IP4) ? IP46_TYPE_IP4 : IP46_TYPE_IP6;
+  switch (t->mode) {
+  case IPIP_MODE_6RD:
+    s = format(s, "[%d] 6rd src %U ip6-pfx %U/%d fib-idx %d sw-if-idx %d ",
+	       t->dev_instance,
+	       format_ip46_address, &t->tunnel_src, type,
+	       format_ip6_address, &t->sixrd.ip6_prefix, t->sixrd.ip6_prefix_len,
+	       t->fib_index, t->sw_if_index);
+    break;
+  case IPIP_MODE_P2P:
+  default:
+    s = format(s, "[%d] instance %d src %U dst %U fib-idx %d sw-if-idx %d ",
+	       t->dev_instance, t->user_instance,
+	       format_ip46_address, &t->tunnel_src, type,
+	       format_ip46_address, &t->tunnel_dst, type,
+	       t->fib_index, t->sw_if_index);
+    break;
+  }
+
+  return s;
+}
+
+static clib_error_t *show_ipip_tunnel_command_fn(vlib_main_t *vm,
+                                                 unformat_input_t *input,
+                                                 vlib_cli_command_t *cmd) {
+  ipip_main_t *gm = &ipip_main;
+  ipip_tunnel_t *t;
+  u32 ti = ~0;
+
+  if (pool_elts(gm->tunnels) == 0)
+    vlib_cli_output(vm, "No IPIP tunnels configured...");
+
+  while (unformat_check_input(input) != UNFORMAT_END_OF_INPUT) {
+    if (unformat(input, "%d", &ti))
+      ;
+    else
+      break;
+  }
+
+  if (ti == ~0) {
+    /* *INDENT-OFF* */
+    pool_foreach(t, gm->tunnels,
+                 ({vlib_cli_output(vm, "%U", format_ipip_tunnel, t); }));
+    /* *INDENT-ON* */
+  } else {
+    t = pool_elt_at_index(gm->tunnels, ti);
+    if (t)
+      vlib_cli_output(vm, "%U", format_ipip_tunnel, t);
+  }
+  return 0;
+}
+
+/* *INDENT-OFF* */
+VLIB_CLI_COMMAND(show_ipip_tunnel_command, static) = {
+    .path = "show ipip tunnel",
+    .function = show_ipip_tunnel_command_fn,
+};
+/* *INDENT-ON* */
+
+static clib_error_t *create_sixrd_tunnel_command_fn(vlib_main_t *vm,
+                                                    unformat_input_t *input,
+                                                    vlib_cli_command_t *cmd) {
+  unformat_input_t _line_input, *line_input = &_line_input;
+  ip4_address_t ip4_prefix;
+  ip6_address_t ip6_prefix;
+  ip4_address_t ip4_src;
+  u32 ip6_prefix_len = 0, ip4_prefix_len = 0, sixrd_tunnel_index;
+  u32 num_m_args = 0;
+  /* Optional arguments */
+  u32 fib_index = 0;
+  clib_error_t *error = 0;
+  bool security_check = false;
+
+  /* Get a line of input. */
+  if (!unformat_user(input, unformat_line_input, line_input))
+    return 0;
+  while (unformat_check_input(line_input) != UNFORMAT_END_OF_INPUT) {
+    if (unformat(line_input, "security-check"))
+      security_check = true;
+    else if (unformat(line_input, "ip6-pfx %U/%d", unformat_ip6_address,
+                      &ip6_prefix, &ip6_prefix_len))
+      num_m_args++;
+    else if (unformat(line_input, "ip4-pfx %U/%d", unformat_ip4_address,
+                      &ip4_prefix, &ip4_prefix_len))
+      num_m_args++;
+    else if (unformat(line_input, "ip4-src %U", unformat_ip4_address, &ip4_src))
+      num_m_args++;
+    else if (unformat(line_input, "fib-id %d", &fib_index))
+      ;
+    else {
+      error = clib_error_return(0, "unknown input `%U'", format_unformat_error,
+                                line_input);
+      goto done;
+    }
+  }
+
+  if (num_m_args < 3) {
+    error = clib_error_return(0, "mandatory argument(s) missing");
+    goto done;
+  }
+  int rv = sixrd_add_tunnel(&ip6_prefix, ip6_prefix_len, &ip4_prefix,
+			    ip4_prefix_len, &ip4_src, security_check,
+			    fib_index, &sixrd_tunnel_index);
+  if (rv)
+    error = clib_error_return(0, "adding tunnel failed %d", rv);
+
+ done:
+  unformat_free(line_input);
+
+  return error;
+}
+
+static clib_error_t *delete_sixrd_tunnel_command_fn(vlib_main_t *vm,
+                                                    unformat_input_t *input,
+                                                    vlib_cli_command_t *cmd) {
+  unformat_input_t _line_input, *line_input = &_line_input;
+  u32 num_m_args = 0;
+  /* Optional arguments */
+  clib_error_t *error = 0;
+  u32 sw_if_index = ~0;
+
+  /* Get a line of input. */
+  if (!unformat_user(input, unformat_line_input, line_input))
+    return 0;
+  while (unformat_check_input(line_input) != UNFORMAT_END_OF_INPUT) {
+    if (unformat(line_input, "sw_if_index %d", &sw_if_index))
+      num_m_args++;
+    else {
+      error = clib_error_return(0, "unknown input `%U'", format_unformat_error,
+                                line_input);
+      goto done;
+    }
+  }
+
+  if (num_m_args < 1) {
+    error = clib_error_return(0, "mandatory argument(s) missing");
+    goto done;
+  }
+  int rv = sixrd_del_tunnel(sw_if_index);
+  printf("RV %d\n", rv);
+
+done:
+  unformat_free(line_input);
+
+  return error;
+}
+
+/* *INDENT-OFF* */
+VLIB_CLI_COMMAND(create_sixrd_tunnel_command, static) = {
+    .path = "create 6rd tunnel",
+    .short_help = "create 6rd tunnel ip6-pfx <ip6-pfx> ip4-pfx <ip4-pfx> "
+                  "ip4-src <ip4-addr> [del]",
+    .function = create_sixrd_tunnel_command_fn,
+};
+VLIB_CLI_COMMAND(delete_sixrd_tunnel_command, static) = {
+    .path = "delete 6rd tunnel",
+    .short_help = "delete 6rd tunnel sw_if_index <sw_if_index",
+    .function = delete_sixrd_tunnel_command_fn,
+};
+/* *INDENT-ON* */
diff --git a/src/vnet/ipip/node.c b/src/vnet/ipip/node.c
new file mode 100644
index 0000000..f24ea97
--- /dev/null
+++ b/src/vnet/ipip/node.c
@@ -0,0 +1,268 @@
+/*
+ * node.c: ipip packet processing
+ *
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or aipiped to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <vlib/vlib.h>
+#include <vnet/ipip/ipip.h>
+#include <vnet/ip/ip6_packet.h>
+#include <vnet/mpls/mpls.h>
+#include <vnet/pg/pg.h>
+#include <vppinfra/sparse_vec.h>
+
+#define foreach_ipip_input_next                                                \
+  _(PUNT, "error-punt")                                                        \
+  _(DROP, "error-drop")                                                        \
+  _(IP4_INPUT, "ip4-input")                                                    \
+  _(IP6_INPUT, "ip6-input")
+
+typedef enum
+{
+#define _(s, n) IPIP_INPUT_NEXT_##s,
+  foreach_ipip_input_next
+#undef _
+    IPIP_INPUT_N_NEXT,
+} ipip_input_next_t;
+
+typedef struct
+{
+  u32 tunnel_id;
+  u32 length;
+  ip46_address_t src;
+  ip46_address_t dst;
+  u8 is_ipv6;
+} ipip_rx_trace_t;
+
+u8 *
+format_ipip_rx_trace (u8 * s, va_list * args)
+{
+  CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
+  CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
+  ipip_rx_trace_t *t = va_arg (*args, ipip_rx_trace_t *);
+
+  s = format (s, "IPIP: tunnel %d len %d src %U dst %U", t->tunnel_id,
+	      clib_net_to_host_u16 (t->length), format_ip46_address, &t->src,
+	      IP46_TYPE_ANY, format_ip46_address, &t->dst, IP46_TYPE_ANY);
+  return s;
+}
+
+always_inline uword
+ipip_input (vlib_main_t * vm, vlib_node_runtime_t * node,
+	    vlib_frame_t * from_frame, bool is_ipv6)
+{
+  ipip_main_t *gm = &ipip_main;
+  u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
+  u32 tunnel_sw_if_index = ~0;
+  u32 thread_index = vlib_get_thread_index ();
+  u32 len;
+  vnet_interface_main_t *im = &gm->vnet_main->interface_main;
+
+  from = vlib_frame_vector_args (from_frame);
+  n_left_from = from_frame->n_vectors;
+  next_index = node->cached_next_index;
+  while (n_left_from > 0)
+    {
+      vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
+
+      while (n_left_from > 0 && n_left_to_next > 0)
+	{
+	  u32 bi0;
+	  vlib_buffer_t *b0;
+	  ip4_header_t *ip40;
+	  ip6_header_t *ip60;
+	  u32 next0 = IPIP_INPUT_NEXT_DROP;
+	  ip46_address_t src0 = ip46_address_initializer, dst0 =
+	    ip46_address_initializer;
+	  ipip_transport_t transport0;
+	  u8 inner_protocol0;
+
+	  bi0 = to_next[0] = from[0];
+	  from += 1;
+	  n_left_from -= 1;
+	  to_next += 1;
+	  n_left_to_next -= 1;
+
+	  b0 = vlib_get_buffer (vm, bi0);
+
+	  if (is_ipv6)
+	    {
+	      ip60 = vlib_buffer_get_current (b0);
+	      vlib_buffer_advance (b0, sizeof (*ip60));
+	      ip_set (&src0, &ip60->src_address, false);
+	      ip_set (&dst0, &ip60->dst_address, false);
+	      inner_protocol0 = ip60->protocol;
+	      transport0 = IPIP_TRANSPORT_IP6;
+	    }
+	  else
+	    {
+	      ip40 = vlib_buffer_get_current (b0);
+	      vlib_buffer_advance (b0, sizeof (*ip40));
+	      ip_set (&src0, &ip40->src_address, true);
+	      ip_set (&dst0, &ip40->dst_address, true);
+	      inner_protocol0 = ip40->protocol;
+	      transport0 = IPIP_TRANSPORT_IP4;
+	    }
+
+	  /*
+	   * Find tunnel. First a lookup for P2P tunnels, then a lookup
+	   * for multipoint tunnels
+	   */
+	  ipip_tunnel_key_t key0 = {.transport = transport0,
+	    .fib_index = vnet_buffer (b0)->ip.fib_index,
+	    .src = dst0,
+	    .dst = src0
+	  };
+	  ipip_tunnel_t *t0 = ipip_tunnel_db_find (&key0);
+	  if (!t0)
+	    {
+	      ip46_address_reset (&key0.dst);
+	      t0 = ipip_tunnel_db_find (&key0);
+	      if (!t0)
+		{
+		  next0 = IPIP_INPUT_NEXT_DROP;
+		  b0->error = node->errors[IPIP_ERROR_NO_TUNNEL];
+		  goto drop;
+		}
+	    }
+	  tunnel_sw_if_index = t0->sw_if_index;
+
+	  len = vlib_buffer_length_in_chain (vm, b0);
+	  vnet_buffer (b0)->sw_if_index[VLIB_RX] = tunnel_sw_if_index;
+
+	  if (inner_protocol0 == IP_PROTOCOL_IPV6)
+	    next0 = IPIP_INPUT_NEXT_IP6_INPUT;
+	  else if (inner_protocol0 == IP_PROTOCOL_IP_IN_IP)
+	    next0 = IPIP_INPUT_NEXT_IP4_INPUT;
+
+	  if (!is_ipv6 && t0->mode == IPIP_MODE_6RD
+	      && t0->sixrd.security_check)
+	    {
+	      ip6_header_t *inner_ip60 = vlib_buffer_get_current (b0);
+	      if (sixrd_get_addr_net (t0, inner_ip60->src_address.as_u64[0])
+		  != ip40->src_address.as_u32)
+		{
+		  next0 = IPIP_INPUT_NEXT_DROP;
+		  b0->error = node->errors[IPIP_ERROR_NO_TUNNEL];
+		  goto drop;
+		}
+	    }
+
+	  vlib_increment_combined_counter (im->combined_sw_if_counters +
+					   VNET_INTERFACE_COUNTER_RX,
+					   thread_index, tunnel_sw_if_index,
+					   1 /* packets */ ,
+					   len /* bytes */ );
+
+	drop:
+	  if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
+	    {
+	      ipip_rx_trace_t *tr =
+		vlib_add_trace (vm, node, b0, sizeof (*tr));
+	      tr->tunnel_id = tunnel_sw_if_index;
+	      if (is_ipv6)
+		{
+		  tr->length = ip60->payload_length;
+		  tr->src.ip6.as_u64[0] = ip60->src_address.as_u64[0];
+		  tr->src.ip6.as_u64[1] = ip60->src_address.as_u64[1];
+		  tr->dst.ip6.as_u64[0] = ip60->dst_address.as_u64[0];
+		  tr->dst.ip6.as_u64[1] = ip60->dst_address.as_u64[1];
+		}
+	      else
+		{
+		  tr->length = ip40->length;
+		  tr->src.ip4.as_u32 = ip40->src_address.as_u32;
+		  tr->dst.ip4.as_u32 = ip40->dst_address.as_u32;
+		}
+	    }
+
+	  vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
+					   n_left_to_next, bi0, next0);
+	}
+
+      vlib_put_next_frame (vm, node, next_index, n_left_to_next);
+    }
+  vlib_node_increment_counter (vm,
+			       !is_ipv6 ? ipip4_input_node.index :
+			       ipip6_input_node.index, IPIP_ERROR_DECAP_PKTS,
+			       from_frame->n_vectors);
+  return from_frame->n_vectors;
+}
+
+static uword
+ipip4_input (vlib_main_t * vm, vlib_node_runtime_t * node,
+	     vlib_frame_t * from_frame)
+{
+  return ipip_input (vm, node, from_frame, /* is_ip6 */ false);
+}
+
+static uword
+ipip6_input (vlib_main_t * vm, vlib_node_runtime_t * node,
+	     vlib_frame_t * from_frame)
+{
+  return ipip_input (vm, node, from_frame, /* is_ip6 */ true);
+}
+
+static char *ipip_error_strings[] = {
+#define _(sym,string) string,
+  foreach_ipip_error
+#undef _
+};
+
+/* *INDENT-OFF* */
+VLIB_REGISTER_NODE(ipip4_input_node) = {
+    .function = ipip4_input,
+    .name = "ipip4-input",
+    /* Takes a vector of packets. */
+    .vector_size = sizeof(u32),
+    .n_errors = IPIP_N_ERROR,
+    .error_strings = ipip_error_strings,
+    .n_next_nodes = IPIP_INPUT_N_NEXT,
+    .next_nodes =
+        {
+#define _(s, n) [IPIP_INPUT_NEXT_##s] = n,
+            foreach_ipip_input_next
+#undef _
+        },
+    .format_trace = format_ipip_rx_trace,
+};
+
+VLIB_REGISTER_NODE(ipip6_input_node) = {
+    .function = ipip6_input,
+    .name = "ipip6-input",
+    /* Takes a vector of packets. */
+    .vector_size = sizeof(u32),
+    .n_errors = IPIP_N_ERROR,
+    .error_strings = ipip_error_strings,
+    .n_next_nodes = IPIP_INPUT_N_NEXT,
+    .next_nodes =
+        {
+#define _(s, n) [IPIP_INPUT_NEXT_##s] = n,
+            foreach_ipip_input_next
+#undef _
+        },
+    .format_trace = format_ipip_rx_trace,
+};
+
+VLIB_NODE_FUNCTION_MULTIARCH(ipip4_input_node, ipip4_input)
+VLIB_NODE_FUNCTION_MULTIARCH(ipip6_input_node, ipip6_input)
+/* *INDENT-ON* */
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/vnet/ipip/sixrd.c b/src/vnet/ipip/sixrd.c
new file mode 100644
index 0000000..c44c834
--- /dev/null
+++ b/src/vnet/ipip/sixrd.c
@@ -0,0 +1,519 @@
+/*
+ * sixrd.c - 6RD specific functions (RFC5969)
+ *
+ * Copyright (c) 2018 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+/**
+ * This code supports the following sixrd modes:
+ *
+ * 32 EA bits (Complete IPv4 address is embedded):
+ *   ea_bits_len = 32
+ * IPv4 suffix is embedded:
+ *   ea_bits_len = < 32
+ * No embedded address bits (1:1 mode):
+ *   ea_bits_len = 0
+ */
+
+#include "ipip.h"
+#include <vlibapi/api.h>
+#include <vlibmemory/api.h>
+#include <vnet/adj/adj.h>
+#include <vnet/adj/adj_delegate.h>
+#include <vnet/adj/adj_midchain.h>
+#include <vnet/dpo/lookup_dpo.h>
+#include <vnet/fib/fib_table.h>
+#include <vnet/fib/ip6_fib.h>
+#include <vnet/plugin/plugin.h>
+#include <vpp/app/version.h>	// Really needed?
+
+extern vlib_node_registration_t ip4_sixrd_node;
+
+/**
+ * Adj delegate data
+ */
+typedef struct sixrd_adj_delegate_t_
+{
+  u32 adj_index;
+  fib_node_t sixrd_node;
+  fib_node_index_t sixrd_fib_entry_index;
+  u32 sixrd_sibling;
+} sixrd_adj_delegate_t;
+
+/**
+ * Pool of delegate structs
+ */
+static sixrd_adj_delegate_t *sixrd_adj_delegate_pool;
+
+/**
+ * Adj delegate registered type
+ */
+static adj_delegate_type_t sixrd_adj_delegate_type;
+
+/**
+ * FIB node registered type
+ */
+static fib_node_type_t sixrd_fib_node_type;
+
+static inline sixrd_adj_delegate_t *
+sixrd_adj_from_base (adj_delegate_t * ad)
+{
+  if (ad == NULL)
+    return (NULL);
+  return (pool_elt_at_index (sixrd_adj_delegate_pool, ad->ad_index));
+}
+
+static inline const sixrd_adj_delegate_t *
+sixrd_adj_from_const_base (const adj_delegate_t * ad)
+{
+  if (ad == NULL)
+    {
+      return (NULL);
+    }
+  return (pool_elt_at_index (sixrd_adj_delegate_pool, ad->ad_index));
+}
+
+static void
+sixrd_fixup (vlib_main_t * vm, ip_adjacency_t * adj, vlib_buffer_t * b0,
+	     const void *data)
+{
+  ip4_header_t *ip4 = vlib_buffer_get_current (b0);
+  ip6_header_t *ip6 = vlib_buffer_get_current (b0) + sizeof (ip4_header_t);
+  const ipip_tunnel_t *t = data;
+
+  ip4->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
+  ip4->dst_address.as_u32 =
+    sixrd_get_addr_net (t, ip6->dst_address.as_u64[0]);
+  ip4->checksum = ip4_header_checksum (ip4);
+}
+
+static void
+ip6ip_fixup (vlib_main_t * vm, ip_adjacency_t * adj, vlib_buffer_t * b0,
+	     const void *data)
+{
+  const ipip_tunnel_t *t = data;
+  ip4_header_t *ip4 = vlib_buffer_get_current (b0);
+  ip4->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
+  ip4->dst_address.as_u32 =
+    sixrd_get_addr_net (t, adj->sub_type.nbr.next_hop.as_u64[0]);
+  ip4->checksum = ip4_header_checksum (ip4);
+}
+
+static u8 *
+sixrd_build_rewrite (vnet_main_t * vnm, u32 sw_if_index,
+		     vnet_link_t link_type, const void *dst_address)
+{
+  u8 *rewrite = NULL;
+  ipip_tunnel_t *t;
+
+  t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (!t)
+    return 0;
+
+  vec_validate (rewrite, sizeof (ip4_header_t) - 1);
+  ip4_header_t *ip4 = (ip4_header_t *) rewrite;
+  ip4->ip_version_and_header_length = 0x45;
+  ip4->ttl = 64;
+  ip4->protocol = IP_PROTOCOL_IPV6;
+  /* fixup ip4 header length and checksum after-the-fact */
+  ip4->src_address.as_u32 = t->tunnel_src.ip4.as_u32;
+  ip4->dst_address.as_u32 = 0;
+  ip4->checksum = ip4_header_checksum (ip4);
+
+  return rewrite;
+}
+
+static void
+ip6ip_tunnel_stack (adj_index_t ai, u32 fib_entry_index)
+{
+  ip_adjacency_t *adj = adj_get (ai);
+  ipip_tunnel_t *t;
+  u32 sw_if_index = adj->rewrite_header.sw_if_index;
+
+  t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (!t)
+    return;
+
+  /*
+   * find the adjacency that is contributed by the FIB entry
+   * that this tunnel resolves via, and use it as the next adj
+   * in the midchain
+   */
+  if (vnet_hw_interface_get_flags (vnet_get_main (), t->hw_if_index) &
+      VNET_HW_INTERFACE_FLAG_LINK_UP)
+    {
+      adj_nbr_midchain_stack (ai,
+			      fib_entry_contribute_ip_forwarding
+			      (fib_entry_index));
+    }
+  else
+    {
+      adj_nbr_midchain_unstack (ai);
+    }
+}
+
+static void
+sixrd_tunnel_stack (adj_index_t ai, u32 fib_index)
+{
+  dpo_id_t dpo = DPO_INVALID;
+  ip_adjacency_t *adj = adj_get (ai);
+  u32 sw_if_index = adj->rewrite_header.sw_if_index;
+
+  ipip_tunnel_t *t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+  if (!t)
+    return;
+
+  lookup_dpo_add_or_lock_w_fib_index (fib_index, DPO_PROTO_IP4,
+				      LOOKUP_UNICAST, LOOKUP_INPUT_DST_ADDR,
+				      LOOKUP_TABLE_FROM_CONFIG, &dpo);
+  adj_nbr_midchain_stack (ai, &dpo);
+}
+
+const static ip46_address_t sixrd_special_nh = {
+  .ip6 = {
+	  .as_u64 = {
+		     [0] = 0xffffffffffffffff,
+		     [1] = 0xffffffffffffffff,
+		     },
+	  },
+};
+
+static void
+sixrd_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
+{
+  ip_adjacency_t *adj = adj_get (ai);
+  ipip_tunnel_t *t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+
+  if (!memcmp (&sixrd_special_nh, &adj->sub_type.nbr.next_hop,
+	       sizeof (sixrd_special_nh)))
+    {
+      adj_nbr_midchain_update_rewrite (ai, sixrd_fixup, t, ADJ_FLAG_NONE,
+				       sixrd_build_rewrite (vnm, sw_if_index,
+							    adj_get_link_type
+							    (ai), NULL));
+      sixrd_tunnel_stack (ai, t->fib_index);
+    }
+  else
+    {
+      sixrd_adj_delegate_t *sixrd_ad;
+      ip4_address_t da4;
+
+      da4.as_u32 =
+	sixrd_get_addr_net (t, adj->sub_type.nbr.next_hop.as_u64[0]);
+
+      fib_prefix_t pfx = {
+	.fp_proto = FIB_PROTOCOL_IP4,
+	.fp_len = 32,
+	.fp_addr = {
+		    .ip4 = da4,
+		    }
+	,
+      };
+
+      adj_nbr_midchain_update_rewrite (ai, ip6ip_fixup, t, ADJ_FLAG_NONE,
+				       sixrd_build_rewrite (vnm, sw_if_index,
+							    adj_get_link_type
+							    (ai), NULL));
+
+      sixrd_ad =
+	sixrd_adj_from_base (adj_delegate_get (adj, sixrd_adj_delegate_type));
+      if (sixrd_ad == NULL)
+	{
+	  pool_get (sixrd_adj_delegate_pool, sixrd_ad);
+	  fib_node_init (&sixrd_ad->sixrd_node, sixrd_fib_node_type);
+	  sixrd_ad->adj_index = ai;
+	  sixrd_ad->sixrd_fib_entry_index =
+	    fib_table_entry_special_add (t->fib_index, &pfx, FIB_SOURCE_RR,
+					 FIB_ENTRY_FLAG_NONE);
+	  sixrd_ad->sixrd_sibling =
+	    fib_entry_child_add (sixrd_ad->sixrd_fib_entry_index,
+				 sixrd_fib_node_type,
+				 sixrd_ad - sixrd_adj_delegate_pool);
+
+	  adj_delegate_add (adj, sixrd_adj_delegate_type,
+			    sixrd_ad - sixrd_adj_delegate_pool);
+
+	  ip6ip_tunnel_stack (ai, sixrd_ad->sixrd_fib_entry_index);
+	}
+    }
+}
+
+clib_error_t *
+sixrd_interface_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
+{
+  /* Always up */
+  vnet_hw_interface_set_flags (vnm, hw_if_index,
+			       VNET_HW_INTERFACE_FLAG_LINK_UP);
+  return /* no error */ 0;
+}
+
+/* *INDENT-OFF* */
+VNET_HW_INTERFACE_CLASS(sixrd_hw_interface_class) = {
+    .name = "ip6ip-6rd",
+    .build_rewrite = sixrd_build_rewrite,
+    .update_adjacency = sixrd_update_adj,
+};
+
+VNET_DEVICE_CLASS(sixrd_device_class) = {
+    .name = "ip6ip-6rd",
+    .admin_up_down_function = sixrd_interface_admin_up_down,
+#ifdef SOON
+    .clear counter = 0;
+#endif
+}
+;
+/* *INDENT-ON* */
+
+int
+sixrd_add_tunnel (ip6_address_t * ip6_prefix, u8 ip6_prefix_len,
+		  ip4_address_t * ip4_prefix, u8 ip4_prefix_len,
+		  ip4_address_t * ip4_src, bool security_check,
+		  u32 fib_index, u32 * sw_if_index)
+{
+  ipip_main_t *gm = &ipip_main;
+  ipip_tunnel_t *t;
+
+  if (fib_index == ~0)
+    return VNET_API_ERROR_NO_SUCH_FIB;
+
+  if ((ip6_prefix_len + 32 - ip4_prefix_len) > 64)
+    return VNET_API_ERROR_INVALID_VALUE;
+
+  /* Tunnel already configured */
+  ip46_address_t src = ip46_address_initializer, dst =
+    ip46_address_initializer;
+  ip_set (&src, ip4_src, true);
+  ipip_tunnel_key_t key = {.transport = IPIP_TRANSPORT_IP4,
+    .fib_index = fib_index,
+    .src = src,
+    .dst = dst
+  };
+
+  t = ipip_tunnel_db_find (&key);
+  if (t)
+    return VNET_API_ERROR_IF_ALREADY_EXISTS;
+
+  /* Get tunnel index */
+  pool_get_aligned (gm->tunnels, t, CLIB_CACHE_LINE_BYTES);
+  memset (t, 0, sizeof (*t));
+  u32 t_idx = t - gm->tunnels;	/* tunnel index (or instance) */
+
+  /* Init tunnel struct */
+  t->mode = IPIP_MODE_6RD;
+  t->sixrd.ip4_prefix.as_u32 = ip4_prefix->as_u32;
+  t->sixrd.ip4_prefix_len = ip4_prefix_len;
+  t->sixrd.ip6_prefix = *ip6_prefix;
+  t->sixrd.ip6_prefix_len = ip6_prefix_len;
+  t->tunnel_src = src;
+  t->sixrd.security_check = security_check;
+  t->sixrd.shift =
+    (ip4_prefix_len < 32) ? 64 - ip6_prefix_len - (32 - ip4_prefix_len) : 0;
+
+  /* Create interface */
+  u32 hw_if_index =
+    vnet_register_interface (vnet_get_main (), sixrd_device_class.index,
+			     t_idx,
+			     sixrd_hw_interface_class.index, t_idx);
+
+  /* Default the interface to up and enable IPv6 (payload) */
+  vnet_hw_interface_t *hi =
+    vnet_get_hw_interface (vnet_get_main (), hw_if_index);
+  t->hw_if_index = hw_if_index;
+  t->fib_index = fib_index;
+  t->sw_if_index = hi->sw_if_index;
+  t->dev_instance = t_idx;
+  t->user_instance = t_idx;
+
+  hi->max_l3_packet_bytes[VLIB_RX] = hi->max_l3_packet_bytes[VLIB_TX] = 1480;
+
+  ipip_tunnel_db_add (t, &key);
+
+  vec_validate_init_empty (gm->tunnel_index_by_sw_if_index, hi->sw_if_index,
+			   ~0);
+  gm->tunnel_index_by_sw_if_index[hi->sw_if_index] = t_idx;
+
+  vnet_hw_interface_set_flags (vnet_get_main (), hw_if_index,
+			       VNET_HW_INTERFACE_FLAG_LINK_UP);
+  vnet_sw_interface_set_flags (vnet_get_main (), hi->sw_if_index,
+			       VNET_SW_INTERFACE_FLAG_ADMIN_UP);
+  ip6_sw_interface_enable_disable (hi->sw_if_index, true);
+
+  /* Create IPv6 route/adjacency */
+  fib_prefix_t pfx6 = {
+    .fp_proto = FIB_PROTOCOL_IP6,
+    .fp_len = t->sixrd.ip6_prefix_len,
+    .fp_addr = {
+		.ip6 = t->sixrd.ip6_prefix,
+		}
+    ,
+  };
+
+  fib_table_entry_update_one_path (fib_index, &pfx6, FIB_SOURCE_CLI,
+				   FIB_ENTRY_FLAG_ATTACHED, DPO_PROTO_IP6,
+				   &sixrd_special_nh, hi->sw_if_index, ~0, 1,
+				   NULL, FIB_ROUTE_PATH_FLAG_NONE);
+
+  *sw_if_index = hi->sw_if_index;
+
+  if (!gm->ip4_protocol_registered)
+    {
+      vlib_node_t *ipip4_input =
+	vlib_get_node_by_name (gm->vlib_main, (u8 *) "ipip4-input");
+      ASSERT (ipip4_input);
+      ip4_register_protocol (IP_PROTOCOL_IPV6, ipip4_input->index);
+    }
+  return 0;
+}
+
+/*
+ * sixrd_del_tunnel
+ */
+int
+sixrd_del_tunnel (u32 sw_if_index)
+{
+  ipip_main_t *gm = &ipip_main;
+  ipip_tunnel_t *t = ipip_tunnel_db_find_by_sw_if_index (sw_if_index);
+
+  if (!t)
+    {
+      clib_warning ("SIXRD tunnel delete: tunnel does not exist: %d",
+		    sw_if_index);
+      return -1;
+    }
+
+  fib_prefix_t pfx6 = {
+    .fp_proto = FIB_PROTOCOL_IP6,
+    .fp_len = t->sixrd.ip6_prefix_len,
+    .fp_addr = {
+		.ip6 = t->sixrd.ip6_prefix,
+		}
+    ,
+  };
+  fib_table_entry_special_remove (0, &pfx6, FIB_SOURCE_CLI);
+  vnet_sw_interface_set_flags (vnet_get_main (), t->sw_if_index,
+			       0 /* down */ );
+  ip6_sw_interface_enable_disable (t->sw_if_index, false);
+  gm->tunnel_index_by_sw_if_index[t->sw_if_index] = ~0;
+
+  vnet_delete_hw_interface (vnet_get_main (), t->hw_if_index);
+  ipip_tunnel_db_remove (t);
+  pool_put (gm->tunnels, t);
+
+  return 0;
+}
+
+static void
+sixrd_adj_delegate_adj_deleted (adj_delegate_t * aed)
+{
+  sixrd_adj_delegate_t *sixrd_ad;
+
+  sixrd_ad = sixrd_adj_from_base (aed);
+  fib_entry_child_remove (sixrd_ad->sixrd_fib_entry_index,
+			  sixrd_ad->sixrd_sibling);
+  fib_table_entry_delete_index (sixrd_ad->sixrd_fib_entry_index,
+				FIB_SOURCE_RR);
+  pool_put (sixrd_adj_delegate_pool, sixrd_ad);
+}
+
+static u8 *
+sixrd_adj_delegate_format (const adj_delegate_t * aed, u8 * s)
+{
+  const sixrd_adj_delegate_t *sixrd_ad;
+
+  sixrd_ad = sixrd_adj_from_const_base (aed);
+  s = format (s, "SIXRD:[fib-entry:%d]", sixrd_ad->sixrd_fib_entry_index);
+
+  return (s);
+}
+
+static void
+sixrd_fib_node_last_lock_gone (fib_node_t * node)
+{
+  /* top of the dependency tree, locks not managed here. */
+}
+
+static sixrd_adj_delegate_t *
+sixrd_adj_delegate_from_fib_node (fib_node_t * node)
+{
+  return ((sixrd_adj_delegate_t *) (((char *) node) -
+				    STRUCT_OFFSET_OF (sixrd_adj_delegate_t,
+						      sixrd_node)));
+}
+
+static fib_node_back_walk_rc_t
+sixrd_fib_node_back_walk_notify (fib_node_t * node,
+				 fib_node_back_walk_ctx_t * ctx)
+{
+  sixrd_adj_delegate_t *sixrd_ad;
+
+  sixrd_ad = sixrd_adj_delegate_from_fib_node (node);
+  ip6ip_tunnel_stack (sixrd_ad->adj_index, sixrd_ad->sixrd_fib_entry_index);
+
+  return (FIB_NODE_BACK_WALK_CONTINUE);
+}
+
+/**
+ * Function definition to get a FIB node from its index
+ */
+static fib_node_t *
+sixrd_fib_node_get (fib_node_index_t index)
+{
+  sixrd_adj_delegate_t *sixrd_ad;
+
+  sixrd_ad = pool_elt_at_index (sixrd_adj_delegate_pool, index);
+
+  return (&sixrd_ad->sixrd_node);
+}
+
+/**
+ * VFT registered with the adjacency delegate
+ */
+const static adj_delegate_vft_t sixrd_adj_delegate_vft = {
+  .adv_adj_deleted = sixrd_adj_delegate_adj_deleted,
+  .adv_format = sixrd_adj_delegate_format,
+};
+
+/**
+ * VFT registered with the FIB node for the adj delegate
+ */
+const static fib_node_vft_t sixrd_fib_node_vft = {
+  .fnv_get = sixrd_fib_node_get,
+  .fnv_last_lock = sixrd_fib_node_last_lock_gone,
+  .fnv_back_walk = sixrd_fib_node_back_walk_notify,
+};
+
+static clib_error_t *
+sixrd_init (vlib_main_t * vm)
+{
+  clib_error_t *error = 0;
+
+  /* Make sure the IPIP tunnel subsystem is initialised */
+  vlib_call_init_function (vm, ipip_init);
+
+  sixrd_adj_delegate_type =
+    adj_delegate_register_new_type (&sixrd_adj_delegate_vft);
+  sixrd_fib_node_type = fib_node_register_new_type (&sixrd_fib_node_vft);
+
+  return error;
+}
+
+VLIB_INIT_FUNCTION (sixrd_init);
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */
diff --git a/src/plugins/sixrd/sixrd.h b/src/vnet/ipip/sixrd.h
similarity index 68%
rename from src/plugins/sixrd/sixrd.h
rename to src/vnet/ipip/sixrd.h
index f443c03..f107d5e 100644
--- a/src/plugins/sixrd/sixrd.h
+++ b/src/vnet/ipip/sixrd.h
@@ -16,41 +16,12 @@
 #include <stdbool.h>
 #include <vnet/fib/ip6_fib.h>
 #include <vnet/ip/ip.h>
+#include <vnet/ipip/ipip.h>
 #include <vnet/vnet.h>
 #include <vppinfra/error.h>
 
 #define SIXRD_DEFAULT_MTU 1480	/* 1500 - IPv4 header */
 
-typedef struct
-{
-  u32 fib_index;
-  u32 hw_if_index;
-  u32 sw_if_index;
-  u32 tunnel_index;
-  ip6_address_t ip6_prefix;
-  ip4_address_t ip4_prefix;
-  ip4_address_t ip4_src;
-  u8 ip6_prefix_len;
-  u8 ip4_prefix_len;
-
-  /* helpers */
-  u8 shift;
-
-  u16 mtu;
-  bool security_check;
-} sixrd_tunnel_t;
-
-typedef struct
-{
-  u16 msg_id_base;
-
-  /* pool of SIXRD domains */
-  sixrd_tunnel_t *tunnels;
-  u32 *tunnel_index_by_sw_if_index;
-  uword *tunnel_by_ip;
-
-} sixrd_main_t;
-
 #define foreach_sixrd_error                                                    \
   /* Must be first. */                                                         \
   _(NONE, "valid SIXRD packets")                                               \
@@ -69,28 +40,6 @@
 
 extern sixrd_main_t sixrd_main;
 
-/*
- * sixrd_get_addr
- */
-static_always_inline u32
-sixrd_get_addr_net (const sixrd_tunnel_t * t, u64 dal)
-{
-  /* 1:1 mode */
-  if (t->ip4_prefix_len == 32)
-    return (t->ip4_prefix.as_u32);
-
-  dal = clib_net_to_host_u64 (dal);
-
-  /* Grab 32 - ip4_prefix_len bits out of IPv6 address from offset
-   * ip6_prefix_len */
-  u32 mask = ~(~0ULL << (32 - t->ip4_prefix_len));
-  u32 ip4 =
-    clib_net_to_host_u32 (t->
-			  ip4_prefix.as_u32) | ((u32) (dal >> t->
-						       shift) & mask);
-  return clib_host_to_net_u32 (ip4);
-}
-
 static_always_inline sixrd_tunnel_t *
 find_tunnel_by_ip4_address (ip4_address_t * ip)
 {
diff --git a/src/vnet/vnet_all_api_h.h b/src/vnet/vnet_all_api_h.h
index dd80a09..90502bf 100644
--- a/src/vnet/vnet_all_api_h.h
+++ b/src/vnet/vnet_all_api_h.h
@@ -34,6 +34,7 @@
 #include <vnet/devices/virtio/vhost_user.api.h>
 #include <vnet/devices/tap/tapv2.api.h>
 #include <vnet/gre/gre.api.h>
+#include <vnet/ipip/ipip.api.h>
 #include <vnet/interface.api.h>
 #include <vnet/map/map.api.h>
 #include <vnet/l2/l2.api.h>
diff --git a/test/test_ipip.py b/test/test_ipip.py
new file mode 100644
index 0000000..1ae4de0
--- /dev/null
+++ b/test/test_ipip.py
@@ -0,0 +1,248 @@
+#
+# IP{4,6} over IP{v,6} tunnel functional tests
+#
+
+import unittest
+from scapy.layers.inet import IP, UDP, ICMP
+from scapy.layers.inet6 import IPv6
+from scapy.layers.l2 import Ether, GRE
+from scapy.packet import Raw
+
+from framework import VppTestCase
+from vpp_ip_route import VppIpRoute, VppRoutePath, DpoProto
+from util import ppp
+from ipaddress import *
+
+""" Testipip is a subclass of  VPPTestCase classes.
+
+IPIP tests.
+
+"""
+
+
+class TestIPIP(VppTestCase):
+    """ IPIP Test Case """
+
+    @classmethod
+    def setUpClass(cls):
+        super(TestIPIP, cls).setUpClass()
+        try:
+            cls.create_pg_interfaces(range(2))
+            cls.interfaces = list(cls.pg_interfaces)
+        except Exception:
+            super(TestIPIP, cls).tearDownClass()
+            raise
+
+    def setUp(cls):
+        super(TestIPIP, cls).setUp()
+        try:
+            for i in cls.interfaces:
+                i.admin_up()
+                i.config_ip4()
+                i.config_ip6()
+                i.disable_ipv6_ra()
+                i.resolve_arp()
+                i.resolve_ndp()
+        except Exception:
+            super(TestIPIP, cls).tearDown()
+            raise
+
+    def tearDown(self):
+        super(TestIPIP, self).tearDown()
+        if not self.vpp_dead:
+            self.vapi.cli("show hardware")
+        for i in self.pg_interfaces:
+            i.unconfig_ip4()
+            i.unconfig_ip6()
+            i.admin_down()
+        self.vapi.cli("show error")
+
+    def validate(self, rx, expected):
+        expected = expected.__class__(str(expected))
+        if rx != expected:
+            print('RX packet:')
+            print(rx.show())
+            print('EXPECTED packet:')
+            print(expected.show())
+            self.assertDictEqual(rx, expected)
+
+    def payload(self, len):
+        return 'x' * len
+
+    def test_ipip4(self):
+        """ ip{v4,v6} over ip4 test """
+        p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
+        p_ip6 = IPv6(src="1::1", dst="DEAD::1", nh='UDP')
+        p_ip4 = IP(src="1.2.3.4", dst="130.67.0.1")
+        p_payload = UDP(sport=1234, dport=1234)
+
+        # IPv4 transport
+        rv = self.vapi.ipip_add_tunnel(
+            src_address=str(ip_address(self.pg0.local_ip4).packed),
+            dst_address=str(ip_address(self.pg1.remote_ip4).packed),
+            is_ipv6=0)
+        self.assertEqual(rv.retval, 0)
+        sw_if_index = rv.sw_if_index
+
+        # Set interface up and enable IP on it
+        rv = self.vapi.sw_interface_set_flags(sw_if_index, 1)
+        self.assertEqual(rv.retval, 0)
+        rv = self.vapi.sw_interface_set_unnumbered(
+            ip_sw_if_index=self.pg0.sw_if_index,
+            sw_if_index=sw_if_index)
+        self.assertEqual(rv.retval, 0)
+
+        # Add IPv4 and IPv6 routes via tunnel interface
+        ip4_via_tunnel = VppIpRoute(
+            self, "130.67.0.0", 16,
+            [VppRoutePath("0.0.0.0",
+                          sw_if_index,
+                          proto=DpoProto.DPO_PROTO_IP4)], is_ip6=0)
+        ip4_via_tunnel.add_vpp_config()
+
+        ip6_via_tunnel = VppIpRoute(
+            self, "dead::", 16,
+            [VppRoutePath("::",
+                          sw_if_index,
+                          proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1)
+        ip6_via_tunnel.add_vpp_config()
+
+        # IPv6 in to IPv4 tunnel
+        p6 = (p_ether / p_ip6 / p_payload)
+        p_inner_ip6 = p_ip6
+        p_inner_ip6.hlim -= 1
+        p6_reply = (IP(src=self.pg0.local_ip4, dst=self.pg1.remote_ip4,
+                       proto='ipv6', id=0) / p_inner_ip6 / p_payload)
+        p6_reply.ttl -= 1
+        rx = self.send_and_expect(self.pg0, p6*10, self.pg1)
+        for p in rx:
+            self.validate(p[1], p6_reply)
+
+        # IPv4 in to IPv4 tunnel
+        p4 = (p_ether / p_ip4 / p_payload)
+        p_ip4_inner = p_ip4
+        p_ip4_inner.ttl -= 1
+        p4_reply = (IP(src=self.pg0.local_ip4,
+                       dst=self.pg1.remote_ip4) / p_ip4_inner / p_payload)
+        p4_reply.ttl -= 1
+        p4_reply.id = 0
+        rx = self.send_and_expect(self.pg0, p4*10, self.pg1)
+        for p in rx:
+            self.validate(p[1], p4_reply)
+
+        # Decapsulation
+        p_ether = Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac)
+
+        # IPv4 tunnel to IPv4
+        p_ip4 = IP(src="1.2.3.4", dst=self.pg0.remote_ip4)
+        p4 = (p_ether / IP(src=self.pg1.remote_ip4,
+                           dst=self.pg0.local_ip4) / p_ip4 / p_payload)
+        p4_reply = (p_ip4 / p_payload)
+        p4_reply.ttl -= 1
+        rx = self.send_and_expect(self.pg1, p4*10, self.pg0)
+        for p in rx:
+            self.validate(p[1], p4_reply)
+
+        # IPv4 tunnel to IPv6
+        p_ip6 = IPv6(src="1:2:3::4", dst=self.pg0.remote_ip6)
+        p6 = (p_ether / IP(src=self.pg1.remote_ip4,
+                           dst=self.pg0.local_ip4) / p_ip6 / p_payload)
+        p6_reply = (p_ip6 / p_payload)
+        p6_reply.hlim = 63
+        rx = self.send_and_expect(self.pg1, p6*10, self.pg0)
+        for p in rx:
+            self.validate(p[1], p6_reply)
+
+    def test_ipip6(self):
+        """ ip{v4,v6} over ip6 test """
+        p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
+        p_ip6 = IPv6(src="1::1", dst="DEAD::1", nh='UDP')
+        p_ip4 = IP(src="1.2.3.4", dst="130.67.0.1")
+        p_payload = UDP(sport=1234, dport=1234)
+
+        # IPv6 transport
+        rv = self.vapi.ipip_add_tunnel(
+            src_address=str(ip_address(self.pg0.local_ip6).packed),
+            dst_address=str(ip_address(self.pg1.remote_ip6).packed))
+        self.assertEqual(rv.retval, 0)
+
+        sw_if_index = rv.sw_if_index
+
+        rv = self.vapi.sw_interface_set_flags(sw_if_index, 1)
+        self.assertEqual(rv.retval, 0)
+        rv = self.vapi.sw_interface_set_unnumbered(
+            ip_sw_if_index=self.pg0.sw_if_index, sw_if_index=sw_if_index)
+        self.assertEqual(rv.retval, 0)
+
+        # Add IPv4 and IPv6 routes via tunnel interface
+        ip4_via_tunnel = VppIpRoute(
+            self, "130.67.0.0", 16,
+            [VppRoutePath("0.0.0.0",
+                          sw_if_index,
+                          proto=DpoProto.DPO_PROTO_IP4)], is_ip6=0)
+        ip4_via_tunnel.add_vpp_config()
+
+        ip6_via_tunnel = VppIpRoute(
+            self, "dead::", 16,
+            [VppRoutePath("::",
+                          sw_if_index,
+                          proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1)
+        ip6_via_tunnel.add_vpp_config()
+
+        # Encapsulation
+
+        # IPv6 in to IPv6 tunnel
+        p6 = (p_ether / p_ip6 / p_payload)
+        p6_reply = (IPv6(src=self.pg0.local_ip6,
+                         dst=self.pg1.remote_ip6, hlim=63) / p_ip6 / p_payload)
+        p6_reply[1].hlim -= 1
+        rx = self.send_and_expect(self.pg0, p6*10, self.pg1)
+        for p in rx:
+            self.validate(p[1], p6_reply)
+
+        # IPv4 in to IPv6 tunnel
+        p4 = (p_ether / p_ip4 / p_payload)
+        p4_reply = (IPv6(src=self.pg0.local_ip6,
+                         dst=self.pg1.remote_ip6, hlim=63) / p_ip4 / p_payload)
+        p4_reply[1].ttl -= 1
+        rx = self.send_and_expect(self.pg0, p4*10, self.pg1)
+        for p in rx:
+            self.validate(p[1], p4_reply)
+
+        # Decapsulation
+
+        p_ether = Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac)
+
+        # IPv6 tunnel to IPv4
+        p_ip4 = IP(src="1.2.3.4", dst=self.pg0.remote_ip4)
+        p4 = (p_ether / IPv6(src=self.pg1.remote_ip6,
+                             dst=self.pg0.local_ip6) / p_ip4 / p_payload)
+        p4_reply = (p_ip4 / p_payload)
+        p4_reply.ttl -= 1
+        rx = self.send_and_expect(self.pg1, p4*10, self.pg0)
+        for p in rx:
+            self.validate(p[1], p4_reply)
+
+        # IPv6 tunnel to IPv6
+        p_ip6 = IPv6(src="1:2:3::4", dst=self.pg0.remote_ip6)
+        p6 = (p_ether / IPv6(src=self.pg1.remote_ip6,
+                             dst=self.pg0.local_ip6) / p_ip6 / p_payload)
+        p6_reply = (p_ip6 / p_payload)
+        p6_reply.hlim = 63
+        rx = self.send_and_expect(self.pg1, p6*10, self.pg0)
+        for p in rx:
+            self.validate(p[1], p6_reply)
+
+    def test_ipip_create(self):
+        """ ipip create / delete interface test """
+        rv = self.vapi.ipip_add_tunnel(
+            src_address=str(ip_address('1.2.3.4').packed),
+            dst_address=str(ip_address('2.3.4.5').packed), is_ipv6=0)
+        self.assertEqual(rv.retval, 0)
+        sw_if_index = rv.sw_if_index
+        rv = self.vapi.ipip_del_tunnel(sw_if_index)
+        self.assertEqual(rv.retval, 0)
+
+
+if __name__ == '__main__':
+    unittest.main(testRunner=VppTestRunner)
diff --git a/test/test_sixrd.py b/test/test_sixrd.py
index 32ebdf4..ac50614 100644
--- a/test/test_sixrd.py
+++ b/test/test_sixrd.py
@@ -57,9 +57,11 @@
             i.admin_down()
         if type(self.tunnel_index) is list:
             for sw_if_index in self.tunnel_index:
-                self.vapi.sixrd_del_tunnel(sw_if_index)
+                rv = self.vapi.ipip_6rd_del_tunnel(sw_if_index)
+                self.assertEqual(rv.retval, 0)
         else:
-            self.vapi.sixrd_del_tunnel(self.tunnel_index)
+            rv = self.vapi.ipip_6rd_del_tunnel(self.tunnel_index)
+            self.assertEqual(rv.retval, 0)
         self.vapi.cli("show error")
 
     def validate_6in4(self, rx, expected):
@@ -92,13 +94,14 @@
         p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
         p_ip6 = IPv6(src="1::1", dst="2002:AC10:0202::1", nh='UDP')
 
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed), 16,
             str(ip_address('0.0.0.0').packed), 0,
-            str(ip_address(self.pg0.local_ip4).packed), 0, True)
+            str(ip_address(self.pg0.local_ip4).packed), True)
 
         self.assertEqual(rv.retval, 0)
         self.tunnel_index = rv.sw_if_index
+
         self.vapi.cli("show ip6 fib")
         p_payload = UDP(sport=1234, dport=1234)
         p = (p_ether / p_ip6 / p_payload)
@@ -124,13 +127,21 @@
     def test_6rd_ip4_to_ip6(self):
         """ ip4 -> ip6 (decap) 6rd test """
 
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed),
             16, str(ip_address('0.0.0.0').packed),
-            0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+            0, str(ip_address(self.pg0.local_ip4).packed), True)
         self.assertEqual(rv.retval, 0)
         self.tunnel_index = rv.sw_if_index
-        self.vapi.cli("show ip6 fib")
+        rv = self.vapi.ipip_6rd_del_tunnel(rv.sw_if_index)
+        self.assertEqual(rv.retval, 0)
+        rv = self.vapi.ipip_6rd_add_tunnel(
+            0, str(ip_address('2002::').packed),
+            16, str(ip_address('0.0.0.0').packed),
+            0, str(ip_address(self.pg0.local_ip4).packed), True)
+        self.tunnel_index = rv.sw_if_index
+        self.assertEqual(rv.retval, 0)
+
         p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) /
                  UDP(sport=1234, dport=1234))
 
@@ -149,18 +160,18 @@
         """ ip4 -> ip6 (decap) 6rd test """
 
         self.tunnel_index = []
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed),
             16, str(ip_address('0.0.0.0').packed),
-            0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+            0, str(ip_address(self.pg0.local_ip4).packed), True)
         self.assertEqual(rv.retval, 0)
         self.tunnel_index.append(rv.sw_if_index)
-        rv = self.vapi.sixrd_add_tunnel(
+
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2003::').packed),
             16, str(ip_address('0.0.0.0').packed),
-            0, str(ip_address(self.pg1.local_ip4).packed), 0, True)
+            0, str(ip_address(self.pg1.local_ip4).packed), True)
         self.assertEqual(rv.retval, 0)
-
         self.tunnel_index.append(rv.sw_if_index)
 
         self.vapi.cli("show ip6 fib")
@@ -184,10 +195,10 @@
     def test_6rd_ip4_to_ip6_suffix(self):
         """ ip4 -> ip6 (decap) 6rd test """
 
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed), 16,
             str(ip_address('172.0.0.0').packed), 8,
-            str(ip_address(self.pg0.local_ip4).packed), 0, True)
+            str(ip_address(self.pg0.local_ip4).packed), True)
         self.assertEqual(rv.retval, 0)
 
         self.tunnel_index = rv.sw_if_index
@@ -206,12 +217,13 @@
     def test_6rd_ip4_to_ip6_sec_check(self):
         """ ip4 -> ip6 (decap) security check 6rd test """
 
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed),
             16, str(ip_address('0.0.0.0').packed),
-            0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+            0, str(ip_address(self.pg0.local_ip4).packed), True)
         self.assertEqual(rv.retval, 0)
         self.tunnel_index = rv.sw_if_index
+
         self.vapi.cli("show ip6 fib")
         p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) /
                  UDP(sport=1234, dport=1234))
@@ -238,10 +250,10 @@
     def test_6rd_bgp_tunnel(self):
         """ 6rd BGP tunnel """
 
-        rv = self.vapi.sixrd_add_tunnel(
+        rv = self.vapi.ipip_6rd_add_tunnel(
             0, str(ip_address('2002::').packed),
             16, str(ip_address('0.0.0.0').packed),
-            0, str(ip_address(self.pg0.local_ip4).packed), 0, False)
+            0, str(ip_address(self.pg0.local_ip4).packed), False)
         self.assertEqual(rv.retval, 0)
         self.tunnel_index = rv.sw_if_index
 
diff --git a/test/vpp_papi_provider.py b/test/vpp_papi_provider.py
index 18bb1f6..22c6a0d 100644
--- a/test/vpp_papi_provider.py
+++ b/test/vpp_papi_provider.py
@@ -3202,21 +3202,35 @@
         """ GBP contract Dump """
         return self.api(self.papi.gbp_contract_dump, {})
 
-    def sixrd_add_tunnel(self, fib_index, ip6_prefix, ip6_prefix_len,
-                         ip4_prefix, ip4_prefix_len, ip4_src, mtu,
-                         security_check):
+    def ipip_6rd_add_tunnel(self, fib_index, ip6_prefix, ip6_prefix_len,
+                            ip4_prefix, ip4_prefix_len, ip4_src,
+                            security_check):
         """ 6RD tunnel Add """
-        return self.api(self.papi.sixrd_add_tunnel,
+        return self.api(self.papi.ipip_6rd_add_tunnel,
                         {'fib_index': fib_index,
                          'ip6_prefix': ip6_prefix,
                          'ip6_prefix_len': ip6_prefix_len,
                          'ip4_prefix': ip4_prefix,
                          'ip4_prefix_len': ip4_prefix_len,
                          'ip4_src': ip4_src,
-                         'mtu': mtu,
                          'security_check': security_check})
 
-    def sixrd_del_tunnel(self, sw_if_index):
+    def ipip_6rd_del_tunnel(self, sw_if_index):
         """ 6RD tunnel Delete """
-        return self.api(self.papi.sixrd_del_tunnel,
+        return self.api(self.papi.ipip_6rd_del_tunnel,
+                        {'sw_if_index': sw_if_index})
+
+    def ipip_add_tunnel(self, src_address, dst_address, is_ipv6=1,
+                        instance=0xFFFFFFFF, fib_index=0):
+        """ IPIP tunnel Add/Del """
+        return self.api(self.papi.ipip_add_tunnel,
+                        {'is_ipv6': is_ipv6,
+                         'instance': instance,
+                         'src_address': src_address,
+                         'dst_address': dst_address,
+                         'fib_index': fib_index})
+
+    def ipip_del_tunnel(self, sw_if_index):
+        """ IPIP tunnel Delete """
+        return self.api(self.papi.ipip_del_tunnel,
                         {'sw_if_index': sw_if_index})