2 * Copyright (c) 2017 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
17 * @brief NAT64 implementation
20 #include <nat/nat64.h>
21 #include <nat/nat64_db.h>
22 #include <nat/nat_reass.h>
23 #include <nat/nat_inlines.h>
24 #include <vnet/fib/ip4_fib.h>
25 #include <vppinfra/crc32.h>
28 nat64_main_t nat64_main;
32 /* Hook up input features */
33 VNET_FEATURE_INIT (nat64_in2out, static) = {
34 .arc_name = "ip6-unicast",
35 .node_name = "nat64-in2out",
36 .runs_before = VNET_FEATURES ("ip6-lookup"),
38 VNET_FEATURE_INIT (nat64_out2in, static) = {
39 .arc_name = "ip4-unicast",
40 .node_name = "nat64-out2in",
41 .runs_before = VNET_FEATURES ("ip4-lookup"),
43 VNET_FEATURE_INIT (nat64_in2out_handoff, static) = {
44 .arc_name = "ip6-unicast",
45 .node_name = "nat64-in2out-handoff",
46 .runs_before = VNET_FEATURES ("ip6-lookup"),
48 VNET_FEATURE_INIT (nat64_out2in_handoff, static) = {
49 .arc_name = "ip4-unicast",
50 .node_name = "nat64-out2in-handoff",
51 .runs_before = VNET_FEATURES ("ip4-lookup"),
55 static u8 well_known_prefix[] = {
56 0x00, 0x64, 0xff, 0x9b,
57 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00,
59 0x00, 0x00, 0x00, 0x00
65 nat64_ip4_add_del_interface_address_cb (ip4_main_t * im, uword opaque,
67 ip4_address_t * address,
69 u32 if_address_index, u32 is_delete)
71 nat64_main_t *nm = &nat64_main;
74 for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
76 if (sw_if_index == nm->auto_add_sw_if_indices[i])
80 /* Don't trip over lease renewal, static config */
81 for (j = 0; j < vec_len (nm->addr_pool); j++)
82 if (nm->addr_pool[j].addr.as_u32 == address->as_u32)
85 (void) nat64_add_del_pool_addr (vlib_get_thread_index (),
91 (void) nat64_add_del_pool_addr (vlib_get_thread_index (),
100 nat64_get_worker_in2out (ip6_address_t * addr)
102 nat64_main_t *nm = &nat64_main;
103 snat_main_t *sm = nm->sm;
104 u32 next_worker_index = nm->sm->first_worker_index;
107 #ifdef clib_crc32c_uses_intrinsics
108 hash = clib_crc32c ((u8 *) addr->as_u32, 16);
110 u64 tmp = addr->as_u64[0] ^ addr->as_u64[1];
111 hash = clib_xxhash (tmp);
114 if (PREDICT_TRUE (is_pow2 (_vec_len (sm->workers))))
115 next_worker_index += sm->workers[hash & (_vec_len (sm->workers) - 1)];
117 next_worker_index += sm->workers[hash % _vec_len (sm->workers)];
119 return next_worker_index;
123 nat64_get_worker_out2in (ip4_header_t * ip)
125 nat64_main_t *nm = &nat64_main;
126 snat_main_t *sm = nm->sm;
131 proto = ip_proto_to_snat_proto (ip->protocol);
132 udp = ip4_next_header (ip);
133 port = udp->dst_port;
136 if (PREDICT_FALSE (ip4_is_fragment (ip)))
138 if (PREDICT_FALSE (nat_reass_is_drop_frag (0)))
139 return vlib_get_thread_index ();
141 if (PREDICT_TRUE (!ip4_is_first_fragment (ip)))
143 nat_reass_ip4_t *reass;
145 reass = nat_ip4_reass_find (ip->src_address, ip->dst_address,
146 ip->fragment_id, ip->protocol);
148 if (reass && (reass->thread_index != (u32) ~ 0))
149 return reass->thread_index;
151 return vlib_get_thread_index ();
155 /* unknown protocol */
156 if (PREDICT_FALSE (proto == ~0))
159 ip46_address_t daddr;
160 nat64_db_bib_entry_t *bibe;
162 clib_memset (&daddr, 0, sizeof (daddr));
163 daddr.ip4.as_u32 = ip->dst_address.as_u32;
166 vec_foreach (db, nm->db)
168 bibe = nat64_db_bib_entry_find (db, &daddr, 0, ip->protocol, 0, 0);
170 return (u32) (db - nm->db);
173 return vlib_get_thread_index ();
177 if (PREDICT_FALSE (ip->protocol == IP_PROTOCOL_ICMP))
179 icmp46_header_t *icmp = (icmp46_header_t *) udp;
180 icmp_echo_header_t *echo = (icmp_echo_header_t *) (icmp + 1);
181 if (!icmp_is_error_message (icmp))
182 port = echo->identifier;
185 ip4_header_t *inner_ip = (ip4_header_t *) (echo + 1);
186 proto = ip_proto_to_snat_proto (inner_ip->protocol);
187 void *l4_header = ip4_next_header (inner_ip);
190 case SNAT_PROTOCOL_ICMP:
191 icmp = (icmp46_header_t *) l4_header;
192 echo = (icmp_echo_header_t *) (icmp + 1);
193 port = echo->identifier;
195 case SNAT_PROTOCOL_UDP:
196 case SNAT_PROTOCOL_TCP:
197 port = ((tcp_udp_header_t *) l4_header)->src_port;
200 return vlib_get_thread_index ();
205 /* worker by outside port (TCP/UDP) */
206 port = clib_net_to_host_u16 (port);
208 return nm->sm->first_worker_index + ((port - 1024) / sm->port_per_thread);
210 return vlib_get_thread_index ();
214 nat64_init (vlib_main_t * vm)
216 nat64_main_t *nm = &nat64_main;
217 vlib_thread_main_t *tm = vlib_get_thread_main ();
218 ip4_add_del_interface_address_callback_t cb4;
219 ip4_main_t *im = &ip4_main;
220 vlib_node_t *error_drop_node =
221 vlib_get_node_by_name (vm, (u8 *) "error-drop");
223 vec_validate (nm->db, tm->n_vlib_mains - 1);
227 nm->fq_in2out_index = ~0;
228 nm->fq_out2in_index = ~0;
229 nm->error_node_index = error_drop_node->index;
231 /* set session timeouts to default values */
232 nm->udp_timeout = SNAT_UDP_TIMEOUT;
233 nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
234 nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
235 nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
237 nm->total_enabled_count = 0;
239 /* Set up the interface address add/del callback */
240 cb4.function = nat64_ip4_add_del_interface_address_cb;
241 cb4.function_opaque = 0;
242 vec_add1 (im->add_del_interface_address_callbacks, cb4);
246 nm->total_bibs.name = "total-bibs";
247 nm->total_bibs.stat_segment_name = "/nat64/total-bibs";
248 vlib_validate_simple_counter (&nm->total_bibs, 0);
249 vlib_zero_simple_counter (&nm->total_bibs, 0);
250 nm->total_sessions.name = "total-sessions";
251 nm->total_sessions.stat_segment_name = "/nat64/total-sessions";
252 vlib_validate_simple_counter (&nm->total_sessions, 0);
253 vlib_zero_simple_counter (&nm->total_sessions, 0);
258 static void nat64_free_out_addr_and_port (struct nat64_db_s *db,
259 ip4_address_t * addr, u16 port,
263 nat64_set_hash (u32 bib_buckets, u32 bib_memory_size, u32 st_buckets,
266 nat64_main_t *nm = &nat64_main;
269 nm->bib_buckets = bib_buckets;
270 nm->bib_memory_size = bib_memory_size;
271 nm->st_buckets = st_buckets;
272 nm->st_memory_size = st_memory_size;
275 vec_foreach (db, nm->db)
277 if (nat64_db_init (db, bib_buckets, bib_memory_size, st_buckets,
278 st_memory_size, nat64_free_out_addr_and_port))
279 nat_log_err ("NAT64 DB init failed");
285 nat64_add_del_pool_addr (u32 thread_index,
286 ip4_address_t * addr, u32 vrf_id, u8 is_add)
288 nat64_main_t *nm = &nat64_main;
289 snat_address_t *a = 0;
290 snat_interface_t *interface;
293 vlib_thread_main_t *tm = vlib_get_thread_main ();
295 /* Check if address already exists */
296 for (i = 0; i < vec_len (nm->addr_pool); i++)
298 if (nm->addr_pool[i].addr.as_u32 == addr->as_u32)
300 a = nm->addr_pool + i;
308 return VNET_API_ERROR_VALUE_EXIST;
310 vec_add2 (nm->addr_pool, a, 1);
315 fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
316 FIB_SOURCE_PLUGIN_HI);
317 #define _(N, id, n, s) \
318 clib_bitmap_alloc (a->busy_##n##_port_bitmap, 65535); \
319 a->busy_##n##_ports = 0; \
320 vec_validate_init_empty (a->busy_##n##_ports_per_thread, tm->n_vlib_mains - 1, 0);
321 foreach_snat_protocol
327 return VNET_API_ERROR_NO_SUCH_ENTRY;
329 if (a->fib_index != ~0)
330 fib_table_unlock (a->fib_index, FIB_PROTOCOL_IP6,
331 FIB_SOURCE_PLUGIN_HI);
332 /* Delete sessions using address */
334 vec_foreach (db, nm->db)
336 nat64_db_free_out_addr (thread_index, db, &a->addr);
337 vlib_set_simple_counter (&nm->total_bibs, db - nm->db, 0,
338 db->bib.bib_entries_num);
339 vlib_set_simple_counter (&nm->total_sessions, db - nm->db, 0,
340 db->st.st_entries_num);
342 #define _(N, id, n, s) \
343 clib_bitmap_free (a->busy_##n##_port_bitmap);
344 foreach_snat_protocol
347 vec_del1 (nm->addr_pool, i);
350 /* Add/del external address to FIB */
352 pool_foreach (interface, nm->interfaces,
354 if (nat_interface_is_inside(interface))
357 snat_add_del_addr_to_fib (addr, 32, interface->sw_if_index, is_add);
366 nat64_pool_addr_walk (nat64_pool_addr_walk_fn_t fn, void *ctx)
368 nat64_main_t *nm = &nat64_main;
369 snat_address_t *a = 0;
372 vec_foreach (a, nm->addr_pool)
381 nat64_add_interface_address (u32 sw_if_index, int is_add)
383 nat64_main_t *nm = &nat64_main;
384 ip4_main_t *ip4_main = nm->ip4_main;
385 ip4_address_t *first_int_addr;
388 first_int_addr = ip4_interface_first_address (ip4_main, sw_if_index, 0);
390 for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
392 if (nm->auto_add_sw_if_indices[i] == sw_if_index)
395 return VNET_API_ERROR_VALUE_EXIST;
398 /* if have address remove it */
400 (void) nat64_add_del_pool_addr (vlib_get_thread_index (),
401 first_int_addr, ~0, 0);
402 vec_del1 (nm->auto_add_sw_if_indices, i);
409 return VNET_API_ERROR_NO_SUCH_ENTRY;
411 /* add to the auto-address list */
412 vec_add1 (nm->auto_add_sw_if_indices, sw_if_index);
414 /* If the address is already bound - or static - add it now */
416 (void) nat64_add_del_pool_addr (vlib_get_thread_index (),
417 first_int_addr, ~0, 1);
423 nat64_add_del_interface (u32 sw_if_index, u8 is_inside, u8 is_add)
425 nat64_main_t *nm = &nat64_main;
426 snat_interface_t *interface = 0, *i;
428 const char *feature_name, *arc_name;
430 /* Check if interface already exists */
432 pool_foreach (i, nm->interfaces,
434 if (i->sw_if_index == sw_if_index)
447 pool_get (nm->interfaces, interface);
448 interface->sw_if_index = sw_if_index;
449 interface->flags = 0;
452 interface->flags |= NAT_INTERFACE_FLAG_IS_INSIDE;
454 interface->flags |= NAT_INTERFACE_FLAG_IS_OUTSIDE;
456 nm->total_enabled_count++;
457 vlib_process_signal_event (nm->sm->vlib_main,
458 nm->nat64_expire_walk_node_index,
459 NAT64_CLEANER_RESCHEDULE, 0);
465 return VNET_API_ERROR_NO_SUCH_ENTRY;
467 if ((nat_interface_is_inside (interface)
468 && nat_interface_is_outside (interface)))
470 is_inside ? ~NAT_INTERFACE_FLAG_IS_INSIDE :
471 ~NAT_INTERFACE_FLAG_IS_OUTSIDE;
473 pool_put (nm->interfaces, interface);
475 nm->total_enabled_count--;
481 vec_foreach (ap, nm->addr_pool)
482 snat_add_del_addr_to_fib(&ap->addr, 32, sw_if_index, is_add);
486 if (nm->sm->num_workers > 1)
489 is_inside ? "nat64-in2out-handoff" : "nat64-out2in-handoff";
490 if (nm->fq_in2out_index == ~0)
491 nm->fq_in2out_index =
492 vlib_frame_queue_main_init (nat64_in2out_node.index, 0);
493 if (nm->fq_out2in_index == ~0)
494 nm->fq_out2in_index =
495 vlib_frame_queue_main_init (nat64_out2in_node.index, 0);
498 feature_name = is_inside ? "nat64-in2out" : "nat64-out2in";
500 arc_name = is_inside ? "ip6-unicast" : "ip4-unicast";
502 return vnet_feature_enable_disable (arc_name, feature_name, sw_if_index,
507 nat64_interfaces_walk (nat64_interface_walk_fn_t fn, void *ctx)
509 nat64_main_t *nm = &nat64_main;
510 snat_interface_t *i = 0;
513 pool_foreach (i, nm->interfaces,
522 nat64_alloc_out_addr_and_port (u32 fib_index, snat_protocol_t proto,
523 ip4_address_t * addr, u16 * port,
526 nat64_main_t *nm = &nat64_main;
527 snat_main_t *sm = nm->sm;
528 snat_session_key_t k;
529 u32 worker_index = 0;
534 if (sm->num_workers > 1)
535 worker_index = thread_index - sm->first_worker_index;
538 sm->alloc_addr_and_port (nm->addr_pool, fib_index, thread_index, &k,
539 sm->port_per_thread, worker_index);
544 addr->as_u32 = k.addr.as_u32;
551 nat64_free_out_addr_and_port (struct nat64_db_s *db, ip4_address_t * addr,
552 u16 port, u8 protocol)
554 nat64_main_t *nm = &nat64_main;
557 u32 thread_index = db - nm->db;
558 snat_protocol_t proto = ip_proto_to_snat_proto (protocol);
559 u16 port_host_byte_order = clib_net_to_host_u16 (port);
561 for (i = 0; i < vec_len (nm->addr_pool); i++)
563 a = nm->addr_pool + i;
564 if (addr->as_u32 != a->addr.as_u32)
568 #define _(N, j, n, s) \
569 case SNAT_PROTOCOL_##N: \
570 ASSERT (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
571 port_host_byte_order) == 1); \
572 clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, port, 0); \
573 a->busy_##n##_ports--; \
574 a->busy_##n##_ports_per_thread[thread_index]--; \
576 foreach_snat_protocol
579 nat_log_notice ("unknown protocol");
587 * @brief Add/delete static BIB entry in worker thread.
590 nat64_static_bib_worker_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
593 nat64_main_t *nm = &nat64_main;
594 u32 thread_index = vm->thread_index;
595 nat64_db_t *db = &nm->db[thread_index];
596 nat64_static_bib_to_update_t *static_bib;
597 nat64_db_bib_entry_t *bibe;
601 pool_foreach (static_bib, nm->static_bibs,
603 if ((static_bib->thread_index != thread_index) || (static_bib->done))
606 if (static_bib->is_add)
608 (void) nat64_db_bib_entry_create (thread_index, db,
609 &static_bib->in_addr,
610 &static_bib->out_addr,
612 static_bib->out_port,
613 static_bib->fib_index,
614 static_bib->proto, 1);
615 vlib_set_simple_counter (&nm->total_bibs, thread_index, 0,
616 db->bib.bib_entries_num);
620 addr.as_u64[0] = static_bib->in_addr.as_u64[0];
621 addr.as_u64[1] = static_bib->in_addr.as_u64[1];
622 bibe = nat64_db_bib_entry_find (db, &addr, static_bib->in_port,
624 static_bib->fib_index, 1);
627 nat64_db_bib_entry_free (thread_index, db, bibe);
628 vlib_set_simple_counter (&nm->total_bibs, thread_index, 0,
629 db->bib.bib_entries_num);
630 vlib_set_simple_counter (&nm->total_sessions, thread_index, 0,
631 db->st.st_entries_num);
635 static_bib->done = 1;
642 static vlib_node_registration_t nat64_static_bib_worker_node;
645 VLIB_REGISTER_NODE (nat64_static_bib_worker_node, static) = {
646 .function = nat64_static_bib_worker_fn,
647 .type = VLIB_NODE_TYPE_INPUT,
648 .state = VLIB_NODE_STATE_INTERRUPT,
649 .name = "nat64-static-bib-worker",
654 nat64_add_del_static_bib_entry (ip6_address_t * in_addr,
655 ip4_address_t * out_addr, u16 in_port,
656 u16 out_port, u8 proto, u32 vrf_id, u8 is_add)
658 nat64_main_t *nm = &nat64_main;
659 nat64_db_bib_entry_t *bibe;
660 u32 fib_index = fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
661 FIB_SOURCE_PLUGIN_HI);
662 snat_protocol_t p = ip_proto_to_snat_proto (proto);
666 u32 thread_index = 0;
668 nat64_static_bib_to_update_t *static_bib;
669 vlib_main_t *worker_vm;
670 u32 *to_be_free = 0, *index;
672 if (nm->sm->num_workers > 1)
674 thread_index = nat64_get_worker_in2out (in_addr);
675 db = &nm->db[thread_index];
678 db = &nm->db[nm->sm->num_workers];
680 addr.as_u64[0] = in_addr->as_u64[0];
681 addr.as_u64[1] = in_addr->as_u64[1];
683 nat64_db_bib_entry_find (db, &addr, clib_host_to_net_u16 (in_port),
684 proto, fib_index, 1);
689 return VNET_API_ERROR_VALUE_EXIST;
691 /* outside port must be assigned to same thread as internall address */
692 if ((out_port > 1024) && (nm->sm->num_workers > 1))
694 if (thread_index != ((out_port - 1024) / nm->sm->port_per_thread))
695 return VNET_API_ERROR_INVALID_VALUE_2;
698 for (i = 0; i < vec_len (nm->addr_pool); i++)
700 a = nm->addr_pool + i;
701 if (out_addr->as_u32 != a->addr.as_u32)
705 #define _(N, j, n, s) \
706 case SNAT_PROTOCOL_##N: \
707 if (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
709 return VNET_API_ERROR_INVALID_VALUE; \
710 clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, \
712 if (out_port > 1024) \
714 a->busy_##n##_ports++; \
715 a->busy_##n##_ports_per_thread[thread_index]++; \
718 foreach_snat_protocol
721 clib_memset (&addr, 0, sizeof (addr));
722 addr.ip4.as_u32 = out_addr->as_u32;
723 if (nat64_db_bib_entry_find (db, &addr, 0, proto, fib_index, 0))
724 return VNET_API_ERROR_INVALID_VALUE;
728 if (!nm->sm->num_workers)
731 nat64_db_bib_entry_create (thread_index, db, in_addr, out_addr,
732 clib_host_to_net_u16 (in_port),
733 clib_host_to_net_u16 (out_port),
734 fib_index, proto, 1);
736 return VNET_API_ERROR_UNSPECIFIED;
738 vlib_set_simple_counter (&nm->total_bibs, thread_index, 0,
739 db->bib.bib_entries_num);
745 return VNET_API_ERROR_NO_SUCH_ENTRY;
747 if (!nm->sm->num_workers)
749 nat64_db_bib_entry_free (thread_index, db, bibe);
750 vlib_set_simple_counter (&nm->total_bibs, thread_index, 0,
751 db->bib.bib_entries_num);
755 if (nm->sm->num_workers)
758 pool_foreach (static_bib, nm->static_bibs,
760 if (static_bib->done)
761 vec_add1 (to_be_free, static_bib - nm->static_bibs);
763 vec_foreach (index, to_be_free)
764 pool_put_index (nm->static_bibs, index[0]);
766 vec_free (to_be_free);
767 pool_get (nm->static_bibs, static_bib);
768 static_bib->in_addr.as_u64[0] = in_addr->as_u64[0];
769 static_bib->in_addr.as_u64[1] = in_addr->as_u64[1];
770 static_bib->in_port = clib_host_to_net_u16 (in_port);
771 static_bib->out_addr.as_u32 = out_addr->as_u32;
772 static_bib->out_port = clib_host_to_net_u16 (out_port);
773 static_bib->fib_index = fib_index;
774 static_bib->proto = proto;
775 static_bib->is_add = is_add;
776 static_bib->thread_index = thread_index;
777 static_bib->done = 0;
778 worker_vm = vlib_mains[thread_index];
780 vlib_node_set_interrupt_pending (worker_vm,
781 nat64_static_bib_worker_node.index);
783 return VNET_API_ERROR_UNSPECIFIED;
790 nat64_set_udp_timeout (u32 timeout)
792 nat64_main_t *nm = &nat64_main;
795 nm->udp_timeout = SNAT_UDP_TIMEOUT;
797 nm->udp_timeout = timeout;
803 nat64_get_udp_timeout (void)
805 nat64_main_t *nm = &nat64_main;
807 return nm->udp_timeout;
811 nat64_set_icmp_timeout (u32 timeout)
813 nat64_main_t *nm = &nat64_main;
816 nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
818 nm->icmp_timeout = timeout;
824 nat64_get_icmp_timeout (void)
826 nat64_main_t *nm = &nat64_main;
828 return nm->icmp_timeout;
832 nat64_set_tcp_timeouts (u32 trans, u32 est)
834 nat64_main_t *nm = &nat64_main;
837 nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
839 nm->tcp_trans_timeout = trans;
842 nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
844 nm->tcp_est_timeout = est;
850 nat64_get_tcp_trans_timeout (void)
852 nat64_main_t *nm = &nat64_main;
854 return nm->tcp_trans_timeout;
858 nat64_get_tcp_est_timeout (void)
860 nat64_main_t *nm = &nat64_main;
862 return nm->tcp_est_timeout;
866 nat64_session_reset_timeout (nat64_db_st_entry_t * ste, vlib_main_t * vm)
868 nat64_main_t *nm = &nat64_main;
869 u32 now = (u32) vlib_time_now (vm);
871 switch (ip_proto_to_snat_proto (ste->proto))
873 case SNAT_PROTOCOL_ICMP:
874 ste->expire = now + nm->icmp_timeout;
876 case SNAT_PROTOCOL_TCP:
878 switch (ste->tcp_state)
880 case NAT64_TCP_STATE_V4_INIT:
881 case NAT64_TCP_STATE_V6_INIT:
882 case NAT64_TCP_STATE_V4_FIN_RCV:
883 case NAT64_TCP_STATE_V6_FIN_RCV:
884 case NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV:
885 case NAT64_TCP_STATE_TRANS:
886 ste->expire = now + nm->tcp_trans_timeout;
888 case NAT64_TCP_STATE_ESTABLISHED:
889 ste->expire = now + nm->tcp_est_timeout;
895 case SNAT_PROTOCOL_UDP:
896 ste->expire = now + nm->udp_timeout;
899 ste->expire = now + nm->udp_timeout;
905 nat64_tcp_session_set_state (nat64_db_st_entry_t * ste, tcp_header_t * tcp,
908 switch (ste->tcp_state)
910 case NAT64_TCP_STATE_CLOSED:
912 if (tcp->flags & TCP_FLAG_SYN)
915 ste->tcp_state = NAT64_TCP_STATE_V6_INIT;
917 ste->tcp_state = NAT64_TCP_STATE_V4_INIT;
921 case NAT64_TCP_STATE_V4_INIT:
923 if (is_ip6 && (tcp->flags & TCP_FLAG_SYN))
924 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
927 case NAT64_TCP_STATE_V6_INIT:
929 if (!is_ip6 && (tcp->flags & TCP_FLAG_SYN))
930 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
933 case NAT64_TCP_STATE_ESTABLISHED:
935 if (tcp->flags & TCP_FLAG_FIN)
938 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_RCV;
940 ste->tcp_state = NAT64_TCP_STATE_V4_FIN_RCV;
942 else if (tcp->flags & TCP_FLAG_RST)
944 ste->tcp_state = NAT64_TCP_STATE_TRANS;
948 case NAT64_TCP_STATE_V4_FIN_RCV:
950 if (is_ip6 && (tcp->flags & TCP_FLAG_FIN))
951 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
954 case NAT64_TCP_STATE_V6_FIN_RCV:
956 if (!is_ip6 && (tcp->flags & TCP_FLAG_FIN))
957 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
960 case NAT64_TCP_STATE_TRANS:
962 if (!(tcp->flags & TCP_FLAG_RST))
963 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
972 nat64_add_del_prefix (ip6_address_t * prefix, u8 plen, u32 vrf_id, u8 is_add)
974 nat64_main_t *nm = &nat64_main;
975 nat64_prefix_t *p = 0;
978 /* Verify prefix length */
979 if (plen != 32 && plen != 40 && plen != 48 && plen != 56 && plen != 64
981 return VNET_API_ERROR_INVALID_VALUE;
983 /* Check if tenant already have prefix */
984 for (i = 0; i < vec_len (nm->pref64); i++)
986 if (nm->pref64[i].vrf_id == vrf_id)
997 vec_add2 (nm->pref64, p, 1);
999 fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
1000 FIB_SOURCE_PLUGIN_HI);
1004 p->prefix.as_u64[0] = prefix->as_u64[0];
1005 p->prefix.as_u64[1] = prefix->as_u64[1];
1011 return VNET_API_ERROR_NO_SUCH_ENTRY;
1013 vec_del1 (nm->pref64, i);
1020 nat64_prefix_walk (nat64_prefix_walk_fn_t fn, void *ctx)
1022 nat64_main_t *nm = &nat64_main;
1023 nat64_prefix_t *p = 0;
1026 vec_foreach (p, nm->pref64)
1035 nat64_compose_ip6 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
1037 nat64_main_t *nm = &nat64_main;
1038 nat64_prefix_t *p, *gp = 0, *prefix = 0;
1041 vec_foreach (p, nm->pref64)
1043 if (p->fib_index == fib_index)
1049 if (p->fib_index == 0)
1059 clib_memcpy_fast (ip6, &p->prefix, sizeof (ip6_address_t));
1063 ip6->as_u32[1] = ip4->as_u32;
1066 ip6->as_u8[5] = ip4->as_u8[0];
1067 ip6->as_u8[6] = ip4->as_u8[1];
1068 ip6->as_u8[7] = ip4->as_u8[2];
1069 ip6->as_u8[9] = ip4->as_u8[3];
1072 ip6->as_u8[6] = ip4->as_u8[0];
1073 ip6->as_u8[7] = ip4->as_u8[1];
1074 ip6->as_u8[9] = ip4->as_u8[2];
1075 ip6->as_u8[10] = ip4->as_u8[3];
1078 ip6->as_u8[7] = ip4->as_u8[0];
1079 ip6->as_u8[9] = ip4->as_u8[1];
1080 ip6->as_u8[10] = ip4->as_u8[2];
1081 ip6->as_u8[11] = ip4->as_u8[3];
1084 ip6->as_u8[9] = ip4->as_u8[0];
1085 ip6->as_u8[10] = ip4->as_u8[1];
1086 ip6->as_u8[11] = ip4->as_u8[2];
1087 ip6->as_u8[12] = ip4->as_u8[3];
1090 ip6->as_u32[3] = ip4->as_u32;
1093 nat_log_notice ("invalid prefix length");
1099 clib_memcpy_fast (ip6, well_known_prefix, sizeof (ip6_address_t));
1100 ip6->as_u32[3] = ip4->as_u32;
1105 nat64_extract_ip4 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
1107 nat64_main_t *nm = &nat64_main;
1108 nat64_prefix_t *p, *gp = 0;
1112 vec_foreach (p, nm->pref64)
1114 if (p->fib_index == fib_index)
1136 ip4->as_u32 = ip6->as_u32[1];
1139 ip4->as_u8[0] = ip6->as_u8[5];
1140 ip4->as_u8[1] = ip6->as_u8[6];
1141 ip4->as_u8[2] = ip6->as_u8[7];
1142 ip4->as_u8[3] = ip6->as_u8[9];
1145 ip4->as_u8[0] = ip6->as_u8[6];
1146 ip4->as_u8[1] = ip6->as_u8[7];
1147 ip4->as_u8[2] = ip6->as_u8[9];
1148 ip4->as_u8[3] = ip6->as_u8[10];
1151 ip4->as_u8[0] = ip6->as_u8[7];
1152 ip4->as_u8[1] = ip6->as_u8[9];
1153 ip4->as_u8[2] = ip6->as_u8[10];
1154 ip4->as_u8[3] = ip6->as_u8[11];
1157 ip4->as_u8[0] = ip6->as_u8[9];
1158 ip4->as_u8[1] = ip6->as_u8[10];
1159 ip4->as_u8[2] = ip6->as_u8[11];
1160 ip4->as_u8[3] = ip6->as_u8[12];
1163 ip4->as_u32 = ip6->as_u32[3];
1166 nat_log_notice ("invalid prefix length");
1172 * @brief Per worker process checking expire time for NAT64 sessions.
1175 nat64_expire_worker_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1178 nat64_main_t *nm = &nat64_main;
1179 u32 thread_index = vm->thread_index;
1180 nat64_db_t *db = &nm->db[thread_index];
1181 u32 now = (u32) vlib_time_now (vm);
1183 nad64_db_st_free_expired (thread_index, db, now);
1184 vlib_set_simple_counter (&nm->total_bibs, thread_index, 0,
1185 db->bib.bib_entries_num);
1186 vlib_set_simple_counter (&nm->total_sessions, thread_index, 0,
1187 db->st.st_entries_num);
1192 static vlib_node_registration_t nat64_expire_worker_walk_node;
1195 VLIB_REGISTER_NODE (nat64_expire_worker_walk_node, static) = {
1196 .function = nat64_expire_worker_walk_fn,
1197 .type = VLIB_NODE_TYPE_INPUT,
1198 .state = VLIB_NODE_STATE_INTERRUPT,
1199 .name = "nat64-expire-worker-walk",
1203 static vlib_node_registration_t nat64_expire_walk_node;
1206 * @brief Centralized process to drive per worker expire walk.
1209 nat64_expire_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1212 nat64_main_t *nm = &nat64_main;
1213 vlib_main_t **worker_vms = 0, *worker_vm;
1215 uword event_type, *event_data = 0;
1217 nm->nat64_expire_walk_node_index = nat64_expire_walk_node.index;
1219 if (vec_len (vlib_mains) == 0)
1220 vec_add1 (worker_vms, vm);
1223 for (i = 0; i < vec_len (vlib_mains); i++)
1225 worker_vm = vlib_mains[i];
1227 vec_add1 (worker_vms, worker_vm);
1233 if (nm->total_enabled_count)
1235 vlib_process_wait_for_event_or_clock (vm, 10.0);
1236 event_type = vlib_process_get_events (vm, &event_data);
1240 vlib_process_wait_for_event (vm);
1241 event_type = vlib_process_get_events (vm, &event_data);
1248 case NAT64_CLEANER_RESCHEDULE:
1251 nat_log_notice ("unknown event %u", event_type);
1255 for (i = 0; i < vec_len (worker_vms); i++)
1257 worker_vm = worker_vms[i];
1258 vlib_node_set_interrupt_pending (worker_vm,
1259 nat64_expire_worker_walk_node.index);
1267 VLIB_REGISTER_NODE (nat64_expire_walk_node, static) = {
1268 .function = nat64_expire_walk_fn,
1269 .type = VLIB_NODE_TYPE_PROCESS,
1270 .name = "nat64-expire-walk",
1275 * fd.io coding-style-patch-verification: ON
1278 * eval: (c-set-style "gnu")