2 * Copyright (c) 2017 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
17 * @brief NAT64 implementation
20 #include <nat/nat64.h>
21 #include <nat/nat64_db.h>
22 #include <nat/nat_reass.h>
23 #include <vnet/fib/ip4_fib.h>
24 #include <vppinfra/crc32.h>
27 nat64_main_t nat64_main;
31 /* Hook up input features */
32 VNET_FEATURE_INIT (nat64_in2out, static) = {
33 .arc_name = "ip6-unicast",
34 .node_name = "nat64-in2out",
35 .runs_before = VNET_FEATURES ("ip6-lookup"),
37 VNET_FEATURE_INIT (nat64_out2in, static) = {
38 .arc_name = "ip4-unicast",
39 .node_name = "nat64-out2in",
40 .runs_before = VNET_FEATURES ("ip4-lookup"),
42 VNET_FEATURE_INIT (nat64_in2out_handoff, static) = {
43 .arc_name = "ip6-unicast",
44 .node_name = "nat64-in2out-handoff",
45 .runs_before = VNET_FEATURES ("ip6-lookup"),
47 VNET_FEATURE_INIT (nat64_out2in_handoff, static) = {
48 .arc_name = "ip4-unicast",
49 .node_name = "nat64-out2in-handoff",
50 .runs_before = VNET_FEATURES ("ip4-lookup"),
54 static u8 well_known_prefix[] = {
55 0x00, 0x64, 0xff, 0x9b,
56 0x00, 0x00, 0x00, 0x00,
57 0x00, 0x00, 0x00, 0x00,
58 0x00, 0x00, 0x00, 0x00
64 nat64_ip4_add_del_interface_address_cb (ip4_main_t * im, uword opaque,
66 ip4_address_t * address,
68 u32 if_address_index, u32 is_delete)
70 nat64_main_t *nm = &nat64_main;
73 for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
75 if (sw_if_index == nm->auto_add_sw_if_indices[i])
79 /* Don't trip over lease renewal, static config */
80 for (j = 0; j < vec_len (nm->addr_pool); j++)
81 if (nm->addr_pool[j].addr.as_u32 == address->as_u32)
84 (void) nat64_add_del_pool_addr (address, ~0, 1);
89 (void) nat64_add_del_pool_addr (address, ~0, 0);
97 nat64_get_worker_in2out (ip6_address_t * addr)
99 nat64_main_t *nm = &nat64_main;
100 snat_main_t *sm = nm->sm;
101 u32 next_worker_index = nm->sm->first_worker_index;
104 #ifdef clib_crc32c_uses_intrinsics
105 hash = clib_crc32c ((u8 *) addr->as_u32, 16);
107 u64 tmp = addr->as_u64[0] ^ addr->as_u64[1];
108 hash = clib_xxhash (tmp);
111 if (PREDICT_TRUE (is_pow2 (_vec_len (sm->workers))))
112 next_worker_index += sm->workers[hash & (_vec_len (sm->workers) - 1)];
114 next_worker_index += sm->workers[hash % _vec_len (sm->workers)];
116 return next_worker_index;
120 nat64_get_worker_out2in (ip4_header_t * ip)
122 nat64_main_t *nm = &nat64_main;
123 snat_main_t *sm = nm->sm;
128 proto = ip_proto_to_snat_proto (ip->protocol);
129 udp = ip4_next_header (ip);
130 port = udp->dst_port;
133 if (PREDICT_FALSE (ip4_is_fragment (ip)))
135 if (PREDICT_FALSE (nat_reass_is_drop_frag (0)))
136 return vlib_get_thread_index ();
138 if (PREDICT_TRUE (!ip4_is_first_fragment (ip)))
140 nat_reass_ip4_t *reass;
142 reass = nat_ip4_reass_find (ip->src_address, ip->dst_address,
143 ip->fragment_id, ip->protocol);
145 if (reass && (reass->thread_index != (u32) ~ 0))
146 return reass->thread_index;
148 return vlib_get_thread_index ();
152 /* unknown protocol */
153 if (PREDICT_FALSE (proto == ~0))
156 ip46_address_t daddr;
157 nat64_db_bib_entry_t *bibe;
159 memset (&daddr, 0, sizeof (daddr));
160 daddr.ip4.as_u32 = ip->dst_address.as_u32;
163 vec_foreach (db, nm->db)
165 bibe = nat64_db_bib_entry_find (db, &daddr, 0, ip->protocol, 0, 0);
167 return (u32) (db - nm->db);
170 return vlib_get_thread_index ();
174 if (PREDICT_FALSE (ip->protocol == IP_PROTOCOL_ICMP))
176 icmp46_header_t *icmp = (icmp46_header_t *) udp;
177 icmp_echo_header_t *echo = (icmp_echo_header_t *) (icmp + 1);
178 if (!icmp_is_error_message (icmp))
179 port = echo->identifier;
182 ip4_header_t *inner_ip = (ip4_header_t *) (echo + 1);
183 proto = ip_proto_to_snat_proto (inner_ip->protocol);
184 void *l4_header = ip4_next_header (inner_ip);
187 case SNAT_PROTOCOL_ICMP:
188 icmp = (icmp46_header_t *) l4_header;
189 echo = (icmp_echo_header_t *) (icmp + 1);
190 port = echo->identifier;
192 case SNAT_PROTOCOL_UDP:
193 case SNAT_PROTOCOL_TCP:
194 port = ((tcp_udp_header_t *) l4_header)->src_port;
197 return vlib_get_thread_index ();
202 /* worker by outside port (TCP/UDP) */
203 port = clib_net_to_host_u16 (port);
205 return (u32) ((port - 1024) / sm->port_per_thread);
207 return vlib_get_thread_index ();
211 nat64_init (vlib_main_t * vm)
213 nat64_main_t *nm = &nat64_main;
214 vlib_thread_main_t *tm = vlib_get_thread_main ();
215 ip4_add_del_interface_address_callback_t cb4;
216 ip4_main_t *im = &ip4_main;
217 vlib_node_t *error_drop_node =
218 vlib_get_node_by_name (vm, (u8 *) "error-drop");
220 vec_validate (nm->db, tm->n_vlib_mains - 1);
224 nm->fq_in2out_index = ~0;
225 nm->fq_out2in_index = ~0;
226 nm->error_node_index = error_drop_node->index;
228 /* set session timeouts to default values */
229 nm->udp_timeout = SNAT_UDP_TIMEOUT;
230 nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
231 nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
232 nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
233 nm->tcp_incoming_syn_timeout = SNAT_TCP_INCOMING_SYN;
235 /* Set up the interface address add/del callback */
236 cb4.function = nat64_ip4_add_del_interface_address_cb;
237 cb4.function_opaque = 0;
238 vec_add1 (im->add_del_interface_address_callbacks, cb4);
245 nat64_set_hash (u32 bib_buckets, u32 bib_memory_size, u32 st_buckets,
248 nat64_main_t *nm = &nat64_main;
251 nm->bib_buckets = bib_buckets;
252 nm->bib_memory_size = bib_memory_size;
253 nm->st_buckets = st_buckets;
254 nm->st_memory_size = st_memory_size;
257 vec_foreach (db, nm->db)
259 if (nat64_db_init (db, bib_buckets, bib_memory_size, st_buckets,
261 clib_warning ("NAT64 DB init failed");
267 nat64_add_del_pool_addr (ip4_address_t * addr, u32 vrf_id, u8 is_add)
269 nat64_main_t *nm = &nat64_main;
270 snat_address_t *a = 0;
271 snat_interface_t *interface;
274 vlib_thread_main_t *tm = vlib_get_thread_main ();
276 /* Check if address already exists */
277 for (i = 0; i < vec_len (nm->addr_pool); i++)
279 if (nm->addr_pool[i].addr.as_u32 == addr->as_u32)
281 a = nm->addr_pool + i;
289 return VNET_API_ERROR_VALUE_EXIST;
291 vec_add2 (nm->addr_pool, a, 1);
296 fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
297 FIB_SOURCE_PLUGIN_HI);
298 #define _(N, id, n, s) \
299 clib_bitmap_alloc (a->busy_##n##_port_bitmap, 65535); \
300 a->busy_##n##_ports = 0; \
301 vec_validate_init_empty (a->busy_##n##_ports_per_thread, tm->n_vlib_mains - 1, 0);
302 foreach_snat_protocol
308 return VNET_API_ERROR_NO_SUCH_ENTRY;
310 if (a->fib_index != ~0)
311 fib_table_unlock (a->fib_index, FIB_PROTOCOL_IP6,
312 FIB_SOURCE_PLUGIN_HI);
313 #define _(N, id, n, s) \
314 clib_bitmap_free (a->busy_##n##_port_bitmap);
315 foreach_snat_protocol
317 /* Delete sessions using address */
319 vec_foreach (db, nm->db)
320 nat64_db_free_out_addr (db, &a->addr);
322 vec_del1 (nm->addr_pool, i);
325 /* Add/del external address to FIB */
327 pool_foreach (interface, nm->interfaces,
329 if (nat_interface_is_inside(interface))
332 snat_add_del_addr_to_fib (addr, 32, interface->sw_if_index, is_add);
341 nat64_pool_addr_walk (nat64_pool_addr_walk_fn_t fn, void *ctx)
343 nat64_main_t *nm = &nat64_main;
344 snat_address_t *a = 0;
347 vec_foreach (a, nm->addr_pool)
356 nat64_add_interface_address (u32 sw_if_index, int is_add)
358 nat64_main_t *nm = &nat64_main;
359 ip4_main_t *ip4_main = nm->ip4_main;
360 ip4_address_t *first_int_addr;
363 first_int_addr = ip4_interface_first_address (ip4_main, sw_if_index, 0);
365 for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
367 if (nm->auto_add_sw_if_indices[i] == sw_if_index)
370 return VNET_API_ERROR_VALUE_EXIST;
373 /* if have address remove it */
375 (void) nat64_add_del_pool_addr (first_int_addr, ~0, 0);
377 vec_del1 (nm->auto_add_sw_if_indices, i);
384 return VNET_API_ERROR_NO_SUCH_ENTRY;
386 /* add to the auto-address list */
387 vec_add1 (nm->auto_add_sw_if_indices, sw_if_index);
389 /* If the address is already bound - or static - add it now */
391 (void) nat64_add_del_pool_addr (first_int_addr, ~0, 1);
397 nat64_add_del_interface (u32 sw_if_index, u8 is_inside, u8 is_add)
399 nat64_main_t *nm = &nat64_main;
400 snat_interface_t *interface = 0, *i;
402 const char *feature_name, *arc_name;
404 /* Check if interface already exists */
406 pool_foreach (i, nm->interfaces,
408 if (i->sw_if_index == sw_if_index)
421 pool_get (nm->interfaces, interface);
422 interface->sw_if_index = sw_if_index;
423 interface->flags = 0;
426 interface->flags |= NAT_INTERFACE_FLAG_IS_INSIDE;
428 interface->flags |= NAT_INTERFACE_FLAG_IS_OUTSIDE;
433 return VNET_API_ERROR_NO_SUCH_ENTRY;
435 if ((nat_interface_is_inside (interface)
436 && nat_interface_is_outside (interface)))
438 is_inside ? ~NAT_INTERFACE_FLAG_IS_INSIDE :
439 ~NAT_INTERFACE_FLAG_IS_OUTSIDE;
441 pool_put (nm->interfaces, interface);
447 vec_foreach (ap, nm->addr_pool)
448 snat_add_del_addr_to_fib(&ap->addr, 32, sw_if_index, is_add);
452 if (nm->sm->num_workers > 1)
455 is_inside ? "nat64-in2out-handoff" : "nat64-out2in-handoff";
456 if (nm->fq_in2out_index == ~0)
457 nm->fq_in2out_index =
458 vlib_frame_queue_main_init (nat64_in2out_node.index, 0);
459 if (nm->fq_out2in_index == ~0)
460 nm->fq_out2in_index =
461 vlib_frame_queue_main_init (nat64_out2in_node.index, 0);
464 feature_name = is_inside ? "nat64-in2out" : "nat64-out2in";
466 arc_name = is_inside ? "ip6-unicast" : "ip4-unicast";
468 return vnet_feature_enable_disable (arc_name, feature_name, sw_if_index,
473 nat64_interfaces_walk (nat64_interface_walk_fn_t fn, void *ctx)
475 nat64_main_t *nm = &nat64_main;
476 snat_interface_t *i = 0;
479 pool_foreach (i, nm->interfaces,
488 nat64_alloc_out_addr_and_port (u32 fib_index, snat_protocol_t proto,
489 ip4_address_t * addr, u16 * port,
492 nat64_main_t *nm = &nat64_main;
493 snat_main_t *sm = nm->sm;
494 snat_session_key_t k;
501 sm->alloc_addr_and_port (nm->addr_pool, fib_index, thread_index, &k, &ai,
502 sm->port_per_thread, thread_index);
507 addr->as_u32 = k.addr.as_u32;
514 nat64_free_out_addr_and_port (ip4_address_t * addr, u16 port,
515 snat_protocol_t proto, u32 thread_index)
517 nat64_main_t *nm = &nat64_main;
521 for (i = 0; i < vec_len (nm->addr_pool); i++)
523 a = nm->addr_pool + i;
524 if (addr->as_u32 != a->addr.as_u32)
528 #define _(N, j, n, s) \
529 case SNAT_PROTOCOL_##N: \
530 ASSERT (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
532 clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, port, 0); \
533 a->busy_##n##_ports--; \
534 a->busy_##n##_ports_per_thread[thread_index]--; \
536 foreach_snat_protocol
539 clib_warning ("unknown protocol");
547 * @brief Add/delete static BIB entry in worker thread.
550 nat64_static_bib_worker_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
553 nat64_main_t *nm = &nat64_main;
554 u32 thread_index = vlib_get_thread_index ();
555 nat64_db_t *db = &nm->db[thread_index];
556 nat64_static_bib_to_update_t *static_bib;
557 nat64_db_bib_entry_t *bibe;
561 pool_foreach (static_bib, nm->static_bibs,
563 if ((static_bib->thread_index != thread_index) || (static_bib->done))
566 if (static_bib->is_add)
567 (void) nat64_db_bib_entry_create (db, &static_bib->in_addr,
568 &static_bib->out_addr,
570 static_bib->out_port,
571 static_bib->fib_index,
572 static_bib->proto, 1);
575 addr.as_u64[0] = static_bib->in_addr.as_u64[0];
576 addr.as_u64[1] = static_bib->in_addr.as_u64[1];
577 bibe = nat64_db_bib_entry_find (db, &addr, static_bib->in_port,
579 static_bib->fib_index, 1);
581 nat64_db_bib_entry_free (db, bibe);
584 static_bib->done = 1;
591 static vlib_node_registration_t nat64_static_bib_worker_node;
594 VLIB_REGISTER_NODE (nat64_static_bib_worker_node, static) = {
595 .function = nat64_static_bib_worker_fn,
596 .type = VLIB_NODE_TYPE_INPUT,
597 .state = VLIB_NODE_STATE_INTERRUPT,
598 .name = "nat64-static-bib-worker",
603 nat64_add_del_static_bib_entry (ip6_address_t * in_addr,
604 ip4_address_t * out_addr, u16 in_port,
605 u16 out_port, u8 proto, u32 vrf_id, u8 is_add)
607 nat64_main_t *nm = &nat64_main;
608 nat64_db_bib_entry_t *bibe;
609 u32 fib_index = fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
610 FIB_SOURCE_PLUGIN_HI);
611 snat_protocol_t p = ip_proto_to_snat_proto (proto);
615 u32 thread_index = 0;
617 nat64_static_bib_to_update_t *static_bib;
618 vlib_main_t *worker_vm;
619 u32 *to_be_free = 0, *index;
621 if (nm->sm->num_workers > 1)
623 thread_index = nat64_get_worker_in2out (in_addr);
624 db = &nm->db[thread_index];
627 db = &nm->db[nm->sm->num_workers];
629 addr.as_u64[0] = in_addr->as_u64[0];
630 addr.as_u64[1] = in_addr->as_u64[1];
632 nat64_db_bib_entry_find (db, &addr, clib_host_to_net_u16 (in_port),
633 proto, fib_index, 1);
638 return VNET_API_ERROR_VALUE_EXIST;
640 /* outside port must be assigned to same thread as internall address */
641 if ((out_port > 1024) && (nm->sm->num_workers > 1))
643 if (thread_index != ((out_port - 1024) / nm->sm->port_per_thread))
644 return VNET_API_ERROR_INVALID_VALUE_2;
647 for (i = 0; i < vec_len (nm->addr_pool); i++)
649 a = nm->addr_pool + i;
650 if (out_addr->as_u32 != a->addr.as_u32)
654 #define _(N, j, n, s) \
655 case SNAT_PROTOCOL_##N: \
656 if (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
658 return VNET_API_ERROR_INVALID_VALUE; \
659 clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, \
661 if (out_port > 1024) \
663 a->busy_##n##_ports++; \
664 a->busy_##n##_ports_per_thread[thread_index]++; \
667 foreach_snat_protocol
670 memset (&addr, 0, sizeof (addr));
671 addr.ip4.as_u32 = out_addr->as_u32;
672 if (nat64_db_bib_entry_find (db, &addr, 0, proto, fib_index, 0))
673 return VNET_API_ERROR_INVALID_VALUE;
677 if (!nm->sm->num_workers)
680 nat64_db_bib_entry_create (db, in_addr, out_addr,
681 clib_host_to_net_u16 (in_port),
682 clib_host_to_net_u16 (out_port),
683 fib_index, proto, 1);
685 return VNET_API_ERROR_UNSPECIFIED;
691 return VNET_API_ERROR_NO_SUCH_ENTRY;
693 if (!nm->sm->num_workers)
695 nat64_free_out_addr_and_port (out_addr, out_port, p, thread_index);
696 nat64_db_bib_entry_free (db, bibe);
700 if (nm->sm->num_workers)
703 pool_foreach (static_bib, nm->static_bibs,
705 if (static_bib->done)
706 vec_add1 (to_be_free, static_bib - nm->static_bibs);
708 vec_foreach (index, to_be_free)
709 pool_put_index (nm->static_bibs, index[0]);
711 vec_free (to_be_free);
712 pool_get (nm->static_bibs, static_bib);
713 static_bib->in_addr.as_u64[0] = in_addr->as_u64[0];
714 static_bib->in_addr.as_u64[1] = in_addr->as_u64[1];
715 static_bib->in_port = clib_host_to_net_u16 (in_port);
716 static_bib->out_addr.as_u32 = out_addr->as_u32;
717 static_bib->out_port = clib_host_to_net_u16 (out_port);
718 static_bib->fib_index = fib_index;
719 static_bib->proto = proto;
720 static_bib->is_add = is_add;
721 static_bib->thread_index = thread_index;
722 static_bib->done = 0;
723 worker_vm = vlib_mains[thread_index];
725 vlib_node_set_interrupt_pending (worker_vm,
726 nat64_static_bib_worker_node.index);
728 return VNET_API_ERROR_UNSPECIFIED;
735 nat64_set_udp_timeout (u32 timeout)
737 nat64_main_t *nm = &nat64_main;
740 nm->udp_timeout = SNAT_UDP_TIMEOUT;
741 else if (timeout < SNAT_UDP_TIMEOUT_MIN)
742 return VNET_API_ERROR_INVALID_VALUE;
744 nm->udp_timeout = timeout;
750 nat64_get_udp_timeout (void)
752 nat64_main_t *nm = &nat64_main;
754 return nm->udp_timeout;
758 nat64_set_icmp_timeout (u32 timeout)
760 nat64_main_t *nm = &nat64_main;
763 nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
765 nm->icmp_timeout = timeout;
771 nat64_get_icmp_timeout (void)
773 nat64_main_t *nm = &nat64_main;
775 return nm->icmp_timeout;
779 nat64_set_tcp_timeouts (u32 trans, u32 est, u32 incoming_syn)
781 nat64_main_t *nm = &nat64_main;
784 nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
786 nm->tcp_trans_timeout = trans;
789 nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
791 nm->tcp_est_timeout = est;
793 if (incoming_syn == 0)
794 nm->tcp_incoming_syn_timeout = SNAT_TCP_INCOMING_SYN;
796 nm->tcp_incoming_syn_timeout = incoming_syn;
802 nat64_get_tcp_trans_timeout (void)
804 nat64_main_t *nm = &nat64_main;
806 return nm->tcp_trans_timeout;
810 nat64_get_tcp_est_timeout (void)
812 nat64_main_t *nm = &nat64_main;
814 return nm->tcp_est_timeout;
818 nat64_get_tcp_incoming_syn_timeout (void)
820 nat64_main_t *nm = &nat64_main;
822 return nm->tcp_incoming_syn_timeout;
826 nat64_session_reset_timeout (nat64_db_st_entry_t * ste, vlib_main_t * vm)
828 nat64_main_t *nm = &nat64_main;
829 u32 now = (u32) vlib_time_now (vm);
831 switch (ip_proto_to_snat_proto (ste->proto))
833 case SNAT_PROTOCOL_ICMP:
834 ste->expire = now + nm->icmp_timeout;
836 case SNAT_PROTOCOL_TCP:
838 switch (ste->tcp_state)
840 case NAT64_TCP_STATE_V4_INIT:
841 case NAT64_TCP_STATE_V6_INIT:
842 case NAT64_TCP_STATE_V4_FIN_RCV:
843 case NAT64_TCP_STATE_V6_FIN_RCV:
844 case NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV:
845 case NAT64_TCP_STATE_TRANS:
846 ste->expire = now + nm->tcp_trans_timeout;
848 case NAT64_TCP_STATE_ESTABLISHED:
849 ste->expire = now + nm->tcp_est_timeout;
855 case SNAT_PROTOCOL_UDP:
856 ste->expire = now + nm->udp_timeout;
859 ste->expire = now + nm->udp_timeout;
865 nat64_tcp_session_set_state (nat64_db_st_entry_t * ste, tcp_header_t * tcp,
868 switch (ste->tcp_state)
870 case NAT64_TCP_STATE_CLOSED:
872 if (tcp->flags & TCP_FLAG_SYN)
875 ste->tcp_state = NAT64_TCP_STATE_V6_INIT;
877 ste->tcp_state = NAT64_TCP_STATE_V4_INIT;
881 case NAT64_TCP_STATE_V4_INIT:
883 if (is_ip6 && (tcp->flags & TCP_FLAG_SYN))
884 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
887 case NAT64_TCP_STATE_V6_INIT:
889 if (!is_ip6 && (tcp->flags & TCP_FLAG_SYN))
890 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
893 case NAT64_TCP_STATE_ESTABLISHED:
895 if (tcp->flags & TCP_FLAG_FIN)
898 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_RCV;
900 ste->tcp_state = NAT64_TCP_STATE_V4_FIN_RCV;
902 else if (tcp->flags & TCP_FLAG_RST)
904 ste->tcp_state = NAT64_TCP_STATE_TRANS;
908 case NAT64_TCP_STATE_V4_FIN_RCV:
910 if (is_ip6 && (tcp->flags & TCP_FLAG_FIN))
911 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
914 case NAT64_TCP_STATE_V6_FIN_RCV:
916 if (!is_ip6 && (tcp->flags & TCP_FLAG_FIN))
917 ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
920 case NAT64_TCP_STATE_TRANS:
922 if (!(tcp->flags & TCP_FLAG_RST))
923 ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
932 nat64_add_del_prefix (ip6_address_t * prefix, u8 plen, u32 vrf_id, u8 is_add)
934 nat64_main_t *nm = &nat64_main;
935 nat64_prefix_t *p = 0;
938 /* Verify prefix length */
939 if (plen != 32 && plen != 40 && plen != 48 && plen != 56 && plen != 64
941 return VNET_API_ERROR_INVALID_VALUE;
943 /* Check if tenant already have prefix */
944 for (i = 0; i < vec_len (nm->pref64); i++)
946 if (nm->pref64[i].vrf_id == vrf_id)
957 vec_add2 (nm->pref64, p, 1);
959 fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
960 FIB_SOURCE_PLUGIN_HI);
964 p->prefix.as_u64[0] = prefix->as_u64[0];
965 p->prefix.as_u64[1] = prefix->as_u64[1];
971 return VNET_API_ERROR_NO_SUCH_ENTRY;
973 vec_del1 (nm->pref64, i);
980 nat64_prefix_walk (nat64_prefix_walk_fn_t fn, void *ctx)
982 nat64_main_t *nm = &nat64_main;
983 nat64_prefix_t *p = 0;
986 vec_foreach (p, nm->pref64)
995 nat64_compose_ip6 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
997 nat64_main_t *nm = &nat64_main;
998 nat64_prefix_t *p, *gp = 0, *prefix = 0;
1001 vec_foreach (p, nm->pref64)
1003 if (p->fib_index == fib_index)
1009 if (p->fib_index == 0)
1019 clib_memcpy (ip6, &p->prefix, sizeof (ip6_address_t));
1023 ip6->as_u32[1] = ip4->as_u32;
1026 ip6->as_u8[5] = ip4->as_u8[0];
1027 ip6->as_u8[6] = ip4->as_u8[1];
1028 ip6->as_u8[7] = ip4->as_u8[2];
1029 ip6->as_u8[9] = ip4->as_u8[3];
1032 ip6->as_u8[6] = ip4->as_u8[0];
1033 ip6->as_u8[7] = ip4->as_u8[1];
1034 ip6->as_u8[9] = ip4->as_u8[2];
1035 ip6->as_u8[10] = ip4->as_u8[3];
1038 ip6->as_u8[7] = ip4->as_u8[0];
1039 ip6->as_u8[9] = ip4->as_u8[1];
1040 ip6->as_u8[10] = ip4->as_u8[2];
1041 ip6->as_u8[11] = ip4->as_u8[3];
1044 ip6->as_u8[9] = ip4->as_u8[0];
1045 ip6->as_u8[10] = ip4->as_u8[1];
1046 ip6->as_u8[11] = ip4->as_u8[2];
1047 ip6->as_u8[12] = ip4->as_u8[3];
1050 ip6->as_u32[3] = ip4->as_u32;
1053 clib_warning ("invalid prefix length");
1059 clib_memcpy (ip6, well_known_prefix, sizeof (ip6_address_t));
1060 ip6->as_u32[3] = ip4->as_u32;
1065 nat64_extract_ip4 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
1067 nat64_main_t *nm = &nat64_main;
1068 nat64_prefix_t *p, *gp = 0;
1072 vec_foreach (p, nm->pref64)
1074 if (p->fib_index == fib_index)
1096 ip4->as_u32 = ip6->as_u32[1];
1099 ip4->as_u8[0] = ip6->as_u8[5];
1100 ip4->as_u8[1] = ip6->as_u8[6];
1101 ip4->as_u8[2] = ip6->as_u8[7];
1102 ip4->as_u8[3] = ip6->as_u8[9];
1105 ip4->as_u8[0] = ip6->as_u8[6];
1106 ip4->as_u8[1] = ip6->as_u8[7];
1107 ip4->as_u8[2] = ip6->as_u8[9];
1108 ip4->as_u8[3] = ip6->as_u8[10];
1111 ip4->as_u8[0] = ip6->as_u8[7];
1112 ip4->as_u8[1] = ip6->as_u8[9];
1113 ip4->as_u8[2] = ip6->as_u8[10];
1114 ip4->as_u8[3] = ip6->as_u8[11];
1117 ip4->as_u8[0] = ip6->as_u8[9];
1118 ip4->as_u8[1] = ip6->as_u8[10];
1119 ip4->as_u8[2] = ip6->as_u8[11];
1120 ip4->as_u8[3] = ip6->as_u8[12];
1123 ip4->as_u32 = ip6->as_u32[3];
1126 clib_warning ("invalid prefix length");
1132 * @brief Per worker process checking expire time for NAT64 sessions.
1135 nat64_expire_worker_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1138 nat64_main_t *nm = &nat64_main;
1139 u32 thread_index = vlib_get_thread_index ();
1140 nat64_db_t *db = &nm->db[thread_index];
1141 u32 now = (u32) vlib_time_now (vm);
1143 nad64_db_st_free_expired (db, now);
1148 static vlib_node_registration_t nat64_expire_worker_walk_node;
1151 VLIB_REGISTER_NODE (nat64_expire_worker_walk_node, static) = {
1152 .function = nat64_expire_worker_walk_fn,
1153 .type = VLIB_NODE_TYPE_INPUT,
1154 .state = VLIB_NODE_STATE_INTERRUPT,
1155 .name = "nat64-expire-worker-walk",
1160 * @brief Centralized process to drive per worker expire walk.
1163 nat64_expire_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1166 vlib_main_t **worker_vms = 0, *worker_vm;
1169 if (vec_len (vlib_mains) == 0)
1170 vec_add1 (worker_vms, vm);
1173 for (i = 0; i < vec_len (vlib_mains); i++)
1175 worker_vm = vlib_mains[i];
1177 vec_add1 (worker_vms, worker_vm);
1183 vlib_process_wait_for_event_or_clock (vm, 10.0);
1184 vlib_process_get_events (vm, NULL);
1185 for (i = 0; i < vec_len (worker_vms); i++)
1187 worker_vm = worker_vms[i];
1188 vlib_node_set_interrupt_pending (worker_vm,
1189 nat64_expire_worker_walk_node.index);
1196 static vlib_node_registration_t nat64_expire_walk_node;
1199 VLIB_REGISTER_NODE (nat64_expire_walk_node, static) = {
1200 .function = nat64_expire_walk_fn,
1201 .type = VLIB_NODE_TYPE_PROCESS,
1202 .name = "nat64-expire-walk",
1207 * fd.io coding-style-patch-verification: ON
1210 * eval: (c-set-style "gnu")