NAT: fixed get_worker_out2in bug (VPP-1116)
[vpp.git] / src / plugins / nat / nat64.c
1 /*
2  * Copyright (c) 2017 Cisco and/or its affiliates.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at:
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 /**
16  * @file
17  * @brief NAT64 implementation
18  */
19
20 #include <nat/nat64.h>
21 #include <nat/nat64_db.h>
22 #include <nat/nat_reass.h>
23 #include <vnet/fib/ip4_fib.h>
24 #include <vppinfra/crc32.h>
25
26
27 nat64_main_t nat64_main;
28
29 /* *INDENT-OFF* */
30
31 /* Hook up input features */
32 VNET_FEATURE_INIT (nat64_in2out, static) = {
33   .arc_name = "ip6-unicast",
34   .node_name = "nat64-in2out",
35   .runs_before = VNET_FEATURES ("ip6-lookup"),
36 };
37 VNET_FEATURE_INIT (nat64_out2in, static) = {
38   .arc_name = "ip4-unicast",
39   .node_name = "nat64-out2in",
40   .runs_before = VNET_FEATURES ("ip4-lookup"),
41 };
42 VNET_FEATURE_INIT (nat64_in2out_handoff, static) = {
43   .arc_name = "ip6-unicast",
44   .node_name = "nat64-in2out-handoff",
45   .runs_before = VNET_FEATURES ("ip6-lookup"),
46 };
47 VNET_FEATURE_INIT (nat64_out2in_handoff, static) = {
48   .arc_name = "ip4-unicast",
49   .node_name = "nat64-out2in-handoff",
50   .runs_before = VNET_FEATURES ("ip4-lookup"),
51 };
52
53
54 static u8 well_known_prefix[] = {
55   0x00, 0x64, 0xff, 0x9b,
56   0x00, 0x00, 0x00, 0x00,
57   0x00, 0x00, 0x00, 0x00,
58   0x00, 0x00, 0x00, 0x00
59 };
60
61 /* *INDENT-ON* */
62
63 static void
64 nat64_ip4_add_del_interface_address_cb (ip4_main_t * im, uword opaque,
65                                         u32 sw_if_index,
66                                         ip4_address_t * address,
67                                         u32 address_length,
68                                         u32 if_address_index, u32 is_delete)
69 {
70   nat64_main_t *nm = &nat64_main;
71   int i, j;
72
73   for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
74     {
75       if (sw_if_index == nm->auto_add_sw_if_indices[i])
76         {
77           if (!is_delete)
78             {
79               /* Don't trip over lease renewal, static config */
80               for (j = 0; j < vec_len (nm->addr_pool); j++)
81                 if (nm->addr_pool[j].addr.as_u32 == address->as_u32)
82                   return;
83
84               (void) nat64_add_del_pool_addr (address, ~0, 1);
85               return;
86             }
87           else
88             {
89               (void) nat64_add_del_pool_addr (address, ~0, 0);
90               return;
91             }
92         }
93     }
94 }
95
96 u32
97 nat64_get_worker_in2out (ip6_address_t * addr)
98 {
99   nat64_main_t *nm = &nat64_main;
100   snat_main_t *sm = nm->sm;
101   u32 next_worker_index = nm->sm->first_worker_index;
102   u32 hash;
103
104 #ifdef clib_crc32c_uses_intrinsics
105   hash = clib_crc32c ((u8 *) addr->as_u32, 16);
106 #else
107   u64 tmp = addr->as_u64[0] ^ addr->as_u64[1];
108   hash = clib_xxhash (tmp);
109 #endif
110
111   if (PREDICT_TRUE (is_pow2 (_vec_len (sm->workers))))
112     next_worker_index += sm->workers[hash & (_vec_len (sm->workers) - 1)];
113   else
114     next_worker_index += sm->workers[hash % _vec_len (sm->workers)];
115
116   return next_worker_index;
117 }
118
119 u32
120 nat64_get_worker_out2in (ip4_header_t * ip)
121 {
122   nat64_main_t *nm = &nat64_main;
123   snat_main_t *sm = nm->sm;
124   udp_header_t *udp;
125   u16 port;
126   u32 proto;
127
128   proto = ip_proto_to_snat_proto (ip->protocol);
129   udp = ip4_next_header (ip);
130   port = udp->dst_port;
131
132   /* fragments */
133   if (PREDICT_FALSE (ip4_is_fragment (ip)))
134     {
135       if (PREDICT_FALSE (nat_reass_is_drop_frag (0)))
136         return vlib_get_thread_index ();
137
138       if (PREDICT_TRUE (!ip4_is_first_fragment (ip)))
139         {
140           nat_reass_ip4_t *reass;
141
142           reass = nat_ip4_reass_find (ip->src_address, ip->dst_address,
143                                       ip->fragment_id, ip->protocol);
144
145           if (reass && (reass->thread_index != (u32) ~ 0))
146             return reass->thread_index;
147           else
148             return vlib_get_thread_index ();
149         }
150     }
151
152   /* unknown protocol */
153   if (PREDICT_FALSE (proto == ~0))
154     {
155       nat64_db_t *db;
156       ip46_address_t daddr;
157       nat64_db_bib_entry_t *bibe;
158
159       memset (&daddr, 0, sizeof (daddr));
160       daddr.ip4.as_u32 = ip->dst_address.as_u32;
161
162       /* *INDENT-OFF* */
163       vec_foreach (db, nm->db)
164         {
165           bibe = nat64_db_bib_entry_find (db, &daddr, 0, ip->protocol, 0, 0);
166           if (bibe)
167             return (u32) (db - nm->db);
168         }
169       /* *INDENT-ON* */
170       return vlib_get_thread_index ();
171     }
172
173   /* ICMP */
174   if (PREDICT_FALSE (ip->protocol == IP_PROTOCOL_ICMP))
175     {
176       icmp46_header_t *icmp = (icmp46_header_t *) udp;
177       icmp_echo_header_t *echo = (icmp_echo_header_t *) (icmp + 1);
178       if (!icmp_is_error_message (icmp))
179         port = echo->identifier;
180       else
181         {
182           ip4_header_t *inner_ip = (ip4_header_t *) (echo + 1);
183           proto = ip_proto_to_snat_proto (inner_ip->protocol);
184           void *l4_header = ip4_next_header (inner_ip);
185           switch (proto)
186             {
187             case SNAT_PROTOCOL_ICMP:
188               icmp = (icmp46_header_t *) l4_header;
189               echo = (icmp_echo_header_t *) (icmp + 1);
190               port = echo->identifier;
191               break;
192             case SNAT_PROTOCOL_UDP:
193             case SNAT_PROTOCOL_TCP:
194               port = ((tcp_udp_header_t *) l4_header)->src_port;
195               break;
196             default:
197               return vlib_get_thread_index ();
198             }
199         }
200     }
201
202   /* worker by outside port  (TCP/UDP) */
203   port = clib_net_to_host_u16 (port);
204   if (port > 1024)
205     return nm->sm->first_worker_index + ((port - 1024) / sm->port_per_thread);
206
207   return vlib_get_thread_index ();
208 }
209
210 clib_error_t *
211 nat64_init (vlib_main_t * vm)
212 {
213   nat64_main_t *nm = &nat64_main;
214   vlib_thread_main_t *tm = vlib_get_thread_main ();
215   ip4_add_del_interface_address_callback_t cb4;
216   ip4_main_t *im = &ip4_main;
217   vlib_node_t *error_drop_node =
218     vlib_get_node_by_name (vm, (u8 *) "error-drop");
219
220   vec_validate (nm->db, tm->n_vlib_mains - 1);
221
222   nm->sm = &snat_main;
223
224   nm->fq_in2out_index = ~0;
225   nm->fq_out2in_index = ~0;
226   nm->error_node_index = error_drop_node->index;
227
228   /* set session timeouts to default values */
229   nm->udp_timeout = SNAT_UDP_TIMEOUT;
230   nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
231   nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
232   nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
233   nm->tcp_incoming_syn_timeout = SNAT_TCP_INCOMING_SYN;
234
235   /* Set up the interface address add/del callback */
236   cb4.function = nat64_ip4_add_del_interface_address_cb;
237   cb4.function_opaque = 0;
238   vec_add1 (im->add_del_interface_address_callbacks, cb4);
239   nm->ip4_main = im;
240
241   return 0;
242 }
243
244 static void nat64_free_out_addr_and_port (struct nat64_db_s *db,
245                                           ip4_address_t * addr, u16 port,
246                                           u8 protocol);
247
248 void
249 nat64_set_hash (u32 bib_buckets, u32 bib_memory_size, u32 st_buckets,
250                 u32 st_memory_size)
251 {
252   nat64_main_t *nm = &nat64_main;
253   nat64_db_t *db;
254
255   nm->bib_buckets = bib_buckets;
256   nm->bib_memory_size = bib_memory_size;
257   nm->st_buckets = st_buckets;
258   nm->st_memory_size = st_memory_size;
259
260   /* *INDENT-OFF* */
261   vec_foreach (db, nm->db)
262     {
263       if (nat64_db_init (db, bib_buckets, bib_memory_size, st_buckets,
264                          st_memory_size, nat64_free_out_addr_and_port))
265         clib_warning ("NAT64 DB init failed");
266     }
267   /* *INDENT-ON* */
268 }
269
270 int
271 nat64_add_del_pool_addr (ip4_address_t * addr, u32 vrf_id, u8 is_add)
272 {
273   nat64_main_t *nm = &nat64_main;
274   snat_address_t *a = 0;
275   snat_interface_t *interface;
276   int i;
277   nat64_db_t *db;
278   vlib_thread_main_t *tm = vlib_get_thread_main ();
279
280   /* Check if address already exists */
281   for (i = 0; i < vec_len (nm->addr_pool); i++)
282     {
283       if (nm->addr_pool[i].addr.as_u32 == addr->as_u32)
284         {
285           a = nm->addr_pool + i;
286           break;
287         }
288     }
289
290   if (is_add)
291     {
292       if (a)
293         return VNET_API_ERROR_VALUE_EXIST;
294
295       vec_add2 (nm->addr_pool, a, 1);
296       a->addr = *addr;
297       a->fib_index = ~0;
298       if (vrf_id != ~0)
299         a->fib_index =
300           fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
301                                              FIB_SOURCE_PLUGIN_HI);
302 #define _(N, id, n, s) \
303       clib_bitmap_alloc (a->busy_##n##_port_bitmap, 65535); \
304       a->busy_##n##_ports = 0; \
305       vec_validate_init_empty (a->busy_##n##_ports_per_thread, tm->n_vlib_mains - 1, 0);
306       foreach_snat_protocol
307 #undef _
308     }
309   else
310     {
311       if (!a)
312         return VNET_API_ERROR_NO_SUCH_ENTRY;
313
314       if (a->fib_index != ~0)
315         fib_table_unlock (a->fib_index, FIB_PROTOCOL_IP6,
316                           FIB_SOURCE_PLUGIN_HI);
317       /* Delete sessions using address */
318         /* *INDENT-OFF* */
319         vec_foreach (db, nm->db)
320           nat64_db_free_out_addr (db, &a->addr);
321 #define _(N, id, n, s) \
322       clib_bitmap_free (a->busy_##n##_port_bitmap);
323       foreach_snat_protocol
324 #undef _
325         /* *INDENT-ON* */
326       vec_del1 (nm->addr_pool, i);
327     }
328
329   /* Add/del external address to FIB */
330   /* *INDENT-OFF* */
331   pool_foreach (interface, nm->interfaces,
332   ({
333     if (nat_interface_is_inside(interface))
334       continue;
335
336     snat_add_del_addr_to_fib (addr, 32, interface->sw_if_index, is_add);
337     break;
338   }));
339   /* *INDENT-ON* */
340
341   return 0;
342 }
343
344 void
345 nat64_pool_addr_walk (nat64_pool_addr_walk_fn_t fn, void *ctx)
346 {
347   nat64_main_t *nm = &nat64_main;
348   snat_address_t *a = 0;
349
350   /* *INDENT-OFF* */
351   vec_foreach (a, nm->addr_pool)
352     {
353       if (fn (a, ctx))
354         break;
355     };
356   /* *INDENT-ON* */
357 }
358
359 int
360 nat64_add_interface_address (u32 sw_if_index, int is_add)
361 {
362   nat64_main_t *nm = &nat64_main;
363   ip4_main_t *ip4_main = nm->ip4_main;
364   ip4_address_t *first_int_addr;
365   int i;
366
367   first_int_addr = ip4_interface_first_address (ip4_main, sw_if_index, 0);
368
369   for (i = 0; i < vec_len (nm->auto_add_sw_if_indices); i++)
370     {
371       if (nm->auto_add_sw_if_indices[i] == sw_if_index)
372         {
373           if (is_add)
374             return VNET_API_ERROR_VALUE_EXIST;
375           else
376             {
377               /* if have address remove it */
378               if (first_int_addr)
379                 (void) nat64_add_del_pool_addr (first_int_addr, ~0, 0);
380
381               vec_del1 (nm->auto_add_sw_if_indices, i);
382               return 0;
383             }
384         }
385     }
386
387   if (!is_add)
388     return VNET_API_ERROR_NO_SUCH_ENTRY;
389
390   /* add to the auto-address list */
391   vec_add1 (nm->auto_add_sw_if_indices, sw_if_index);
392
393   /* If the address is already bound - or static - add it now */
394   if (first_int_addr)
395     (void) nat64_add_del_pool_addr (first_int_addr, ~0, 1);
396
397   return 0;
398 }
399
400 int
401 nat64_add_del_interface (u32 sw_if_index, u8 is_inside, u8 is_add)
402 {
403   nat64_main_t *nm = &nat64_main;
404   snat_interface_t *interface = 0, *i;
405   snat_address_t *ap;
406   const char *feature_name, *arc_name;
407
408   /* Check if interface already exists */
409   /* *INDENT-OFF* */
410   pool_foreach (i, nm->interfaces,
411   ({
412     if (i->sw_if_index == sw_if_index)
413       {
414         interface = i;
415         break;
416       }
417   }));
418   /* *INDENT-ON* */
419
420   if (is_add)
421     {
422       if (interface)
423         goto set_flags;
424
425       pool_get (nm->interfaces, interface);
426       interface->sw_if_index = sw_if_index;
427       interface->flags = 0;
428     set_flags:
429       if (is_inside)
430         interface->flags |= NAT_INTERFACE_FLAG_IS_INSIDE;
431       else
432         interface->flags |= NAT_INTERFACE_FLAG_IS_OUTSIDE;
433     }
434   else
435     {
436       if (!interface)
437         return VNET_API_ERROR_NO_SUCH_ENTRY;
438
439       if ((nat_interface_is_inside (interface)
440            && nat_interface_is_outside (interface)))
441         interface->flags &=
442           is_inside ? ~NAT_INTERFACE_FLAG_IS_INSIDE :
443           ~NAT_INTERFACE_FLAG_IS_OUTSIDE;
444       else
445         pool_put (nm->interfaces, interface);
446     }
447
448   if (!is_inside)
449     {
450       /* *INDENT-OFF* */
451       vec_foreach (ap, nm->addr_pool)
452         snat_add_del_addr_to_fib(&ap->addr, 32, sw_if_index, is_add);
453       /* *INDENT-ON* */
454     }
455
456   if (nm->sm->num_workers > 1)
457     {
458       feature_name =
459         is_inside ? "nat64-in2out-handoff" : "nat64-out2in-handoff";
460       if (nm->fq_in2out_index == ~0)
461         nm->fq_in2out_index =
462           vlib_frame_queue_main_init (nat64_in2out_node.index, 0);
463       if (nm->fq_out2in_index == ~0)
464         nm->fq_out2in_index =
465           vlib_frame_queue_main_init (nat64_out2in_node.index, 0);
466     }
467   else
468     feature_name = is_inside ? "nat64-in2out" : "nat64-out2in";
469
470   arc_name = is_inside ? "ip6-unicast" : "ip4-unicast";
471
472   return vnet_feature_enable_disable (arc_name, feature_name, sw_if_index,
473                                       is_add, 0, 0);
474 }
475
476 void
477 nat64_interfaces_walk (nat64_interface_walk_fn_t fn, void *ctx)
478 {
479   nat64_main_t *nm = &nat64_main;
480   snat_interface_t *i = 0;
481
482   /* *INDENT-OFF* */
483   pool_foreach (i, nm->interfaces,
484   ({
485     if (fn (i, ctx))
486       break;
487   }));
488   /* *INDENT-ON* */
489 }
490
491 int
492 nat64_alloc_out_addr_and_port (u32 fib_index, snat_protocol_t proto,
493                                ip4_address_t * addr, u16 * port,
494                                u32 thread_index)
495 {
496   nat64_main_t *nm = &nat64_main;
497   snat_main_t *sm = nm->sm;
498   snat_session_key_t k;
499   u32 ai;
500   u32 worker_index = 0;
501   int rv;
502
503   k.protocol = proto;
504
505   if (sm->num_workers > 1)
506     worker_index = thread_index - sm->first_worker_index;
507
508   rv =
509     sm->alloc_addr_and_port (nm->addr_pool, fib_index, thread_index, &k, &ai,
510                              sm->port_per_thread, worker_index);
511
512   if (!rv)
513     {
514       *port = k.port;
515       addr->as_u32 = k.addr.as_u32;
516     }
517
518   return rv;
519 }
520
521 static void
522 nat64_free_out_addr_and_port (struct nat64_db_s *db, ip4_address_t * addr,
523                               u16 port, u8 protocol)
524 {
525   nat64_main_t *nm = &nat64_main;
526   int i;
527   snat_address_t *a;
528   u32 thread_index = db - nm->db;
529   snat_protocol_t proto = ip_proto_to_snat_proto (protocol);
530   u16 port_host_byte_order = clib_net_to_host_u16 (port);
531
532   for (i = 0; i < vec_len (nm->addr_pool); i++)
533     {
534       a = nm->addr_pool + i;
535       if (addr->as_u32 != a->addr.as_u32)
536         continue;
537       switch (proto)
538         {
539 #define _(N, j, n, s) \
540         case SNAT_PROTOCOL_##N: \
541           ASSERT (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
542                   port_host_byte_order) == 1); \
543           clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, port, 0); \
544           a->busy_##n##_ports--; \
545           a->busy_##n##_ports_per_thread[thread_index]--; \
546           break;
547           foreach_snat_protocol
548 #undef _
549         default:
550           clib_warning ("unknown protocol");
551           return;
552         }
553       break;
554     }
555 }
556
557 /**
558  * @brief Add/delete static BIB entry in worker thread.
559  */
560 static uword
561 nat64_static_bib_worker_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
562                             vlib_frame_t * f)
563 {
564   nat64_main_t *nm = &nat64_main;
565   u32 thread_index = vlib_get_thread_index ();
566   nat64_db_t *db = &nm->db[thread_index];
567   nat64_static_bib_to_update_t *static_bib;
568   nat64_db_bib_entry_t *bibe;
569   ip46_address_t addr;
570
571   /* *INDENT-OFF* */
572   pool_foreach (static_bib, nm->static_bibs,
573   ({
574     if ((static_bib->thread_index != thread_index) || (static_bib->done))
575       continue;
576
577     if (static_bib->is_add)
578       (void) nat64_db_bib_entry_create (db, &static_bib->in_addr,
579                                         &static_bib->out_addr,
580                                         static_bib->in_port,
581                                         static_bib->out_port,
582                                         static_bib->fib_index,
583                                         static_bib->proto, 1);
584     else
585       {
586         addr.as_u64[0] = static_bib->in_addr.as_u64[0];
587         addr.as_u64[1] = static_bib->in_addr.as_u64[1];
588         bibe = nat64_db_bib_entry_find (db, &addr, static_bib->in_port,
589                                         static_bib->proto,
590                                         static_bib->fib_index, 1);
591         if (bibe)
592           nat64_db_bib_entry_free (db, bibe);
593       }
594
595       static_bib->done = 1;
596   }));
597   /* *INDENT-ON* */
598
599   return 0;
600 }
601
602 static vlib_node_registration_t nat64_static_bib_worker_node;
603
604 /* *INDENT-OFF* */
605 VLIB_REGISTER_NODE (nat64_static_bib_worker_node, static) = {
606     .function = nat64_static_bib_worker_fn,
607     .type = VLIB_NODE_TYPE_INPUT,
608     .state = VLIB_NODE_STATE_INTERRUPT,
609     .name = "nat64-static-bib-worker",
610 };
611 /* *INDENT-ON* */
612
613 int
614 nat64_add_del_static_bib_entry (ip6_address_t * in_addr,
615                                 ip4_address_t * out_addr, u16 in_port,
616                                 u16 out_port, u8 proto, u32 vrf_id, u8 is_add)
617 {
618   nat64_main_t *nm = &nat64_main;
619   nat64_db_bib_entry_t *bibe;
620   u32 fib_index = fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
621                                                      FIB_SOURCE_PLUGIN_HI);
622   snat_protocol_t p = ip_proto_to_snat_proto (proto);
623   ip46_address_t addr;
624   int i;
625   snat_address_t *a;
626   u32 thread_index = 0;
627   nat64_db_t *db;
628   nat64_static_bib_to_update_t *static_bib;
629   vlib_main_t *worker_vm;
630   u32 *to_be_free = 0, *index;
631
632   if (nm->sm->num_workers > 1)
633     {
634       thread_index = nat64_get_worker_in2out (in_addr);
635       db = &nm->db[thread_index];
636     }
637   else
638     db = &nm->db[nm->sm->num_workers];
639
640   addr.as_u64[0] = in_addr->as_u64[0];
641   addr.as_u64[1] = in_addr->as_u64[1];
642   bibe =
643     nat64_db_bib_entry_find (db, &addr, clib_host_to_net_u16 (in_port),
644                              proto, fib_index, 1);
645
646   if (is_add)
647     {
648       if (bibe)
649         return VNET_API_ERROR_VALUE_EXIST;
650
651       /* outside port must be assigned to same thread as internall address */
652       if ((out_port > 1024) && (nm->sm->num_workers > 1))
653         {
654           if (thread_index != ((out_port - 1024) / nm->sm->port_per_thread))
655             return VNET_API_ERROR_INVALID_VALUE_2;
656         }
657
658       for (i = 0; i < vec_len (nm->addr_pool); i++)
659         {
660           a = nm->addr_pool + i;
661           if (out_addr->as_u32 != a->addr.as_u32)
662             continue;
663           switch (p)
664             {
665 #define _(N, j, n, s) \
666             case SNAT_PROTOCOL_##N: \
667               if (clib_bitmap_get_no_check (a->busy_##n##_port_bitmap, \
668                                             out_port)) \
669                 return VNET_API_ERROR_INVALID_VALUE; \
670               clib_bitmap_set_no_check (a->busy_##n##_port_bitmap, \
671                                         out_port, 1); \
672               if (out_port > 1024) \
673                 { \
674                   a->busy_##n##_ports++; \
675                   a->busy_##n##_ports_per_thread[thread_index]++; \
676                 } \
677               break;
678               foreach_snat_protocol
679 #undef _
680             default:
681               memset (&addr, 0, sizeof (addr));
682               addr.ip4.as_u32 = out_addr->as_u32;
683               if (nat64_db_bib_entry_find (db, &addr, 0, proto, fib_index, 0))
684                 return VNET_API_ERROR_INVALID_VALUE;
685             }
686           break;
687         }
688       if (!nm->sm->num_workers)
689         {
690           bibe =
691             nat64_db_bib_entry_create (db, in_addr, out_addr,
692                                        clib_host_to_net_u16 (in_port),
693                                        clib_host_to_net_u16 (out_port),
694                                        fib_index, proto, 1);
695           if (!bibe)
696             return VNET_API_ERROR_UNSPECIFIED;
697         }
698     }
699   else
700     {
701       if (!bibe)
702         return VNET_API_ERROR_NO_SUCH_ENTRY;
703
704       if (!nm->sm->num_workers)
705         nat64_db_bib_entry_free (db, bibe);
706     }
707
708   if (nm->sm->num_workers)
709     {
710       /* *INDENT-OFF* */
711       pool_foreach (static_bib, nm->static_bibs,
712       ({
713         if (static_bib->done)
714           vec_add1 (to_be_free, static_bib - nm->static_bibs);
715       }));
716       vec_foreach (index, to_be_free)
717         pool_put_index (nm->static_bibs, index[0]);
718       /* *INDENT-ON* */
719       vec_free (to_be_free);
720       pool_get (nm->static_bibs, static_bib);
721       static_bib->in_addr.as_u64[0] = in_addr->as_u64[0];
722       static_bib->in_addr.as_u64[1] = in_addr->as_u64[1];
723       static_bib->in_port = clib_host_to_net_u16 (in_port);
724       static_bib->out_addr.as_u32 = out_addr->as_u32;
725       static_bib->out_port = clib_host_to_net_u16 (out_port);
726       static_bib->fib_index = fib_index;
727       static_bib->proto = proto;
728       static_bib->is_add = is_add;
729       static_bib->thread_index = thread_index;
730       static_bib->done = 0;
731       worker_vm = vlib_mains[thread_index];
732       if (worker_vm)
733         vlib_node_set_interrupt_pending (worker_vm,
734                                          nat64_static_bib_worker_node.index);
735       else
736         return VNET_API_ERROR_UNSPECIFIED;
737     }
738
739   return 0;
740 }
741
742 int
743 nat64_set_udp_timeout (u32 timeout)
744 {
745   nat64_main_t *nm = &nat64_main;
746
747   if (timeout == 0)
748     nm->udp_timeout = SNAT_UDP_TIMEOUT;
749   else if (timeout < SNAT_UDP_TIMEOUT_MIN)
750     return VNET_API_ERROR_INVALID_VALUE;
751   else
752     nm->udp_timeout = timeout;
753
754   return 0;
755 }
756
757 u32
758 nat64_get_udp_timeout (void)
759 {
760   nat64_main_t *nm = &nat64_main;
761
762   return nm->udp_timeout;
763 }
764
765 int
766 nat64_set_icmp_timeout (u32 timeout)
767 {
768   nat64_main_t *nm = &nat64_main;
769
770   if (timeout == 0)
771     nm->icmp_timeout = SNAT_ICMP_TIMEOUT;
772   else
773     nm->icmp_timeout = timeout;
774
775   return 0;
776 }
777
778 u32
779 nat64_get_icmp_timeout (void)
780 {
781   nat64_main_t *nm = &nat64_main;
782
783   return nm->icmp_timeout;
784 }
785
786 int
787 nat64_set_tcp_timeouts (u32 trans, u32 est, u32 incoming_syn)
788 {
789   nat64_main_t *nm = &nat64_main;
790
791   if (trans == 0)
792     nm->tcp_trans_timeout = SNAT_TCP_TRANSITORY_TIMEOUT;
793   else
794     nm->tcp_trans_timeout = trans;
795
796   if (est == 0)
797     nm->tcp_est_timeout = SNAT_TCP_ESTABLISHED_TIMEOUT;
798   else
799     nm->tcp_est_timeout = est;
800
801   if (incoming_syn == 0)
802     nm->tcp_incoming_syn_timeout = SNAT_TCP_INCOMING_SYN;
803   else
804     nm->tcp_incoming_syn_timeout = incoming_syn;
805
806   return 0;
807 }
808
809 u32
810 nat64_get_tcp_trans_timeout (void)
811 {
812   nat64_main_t *nm = &nat64_main;
813
814   return nm->tcp_trans_timeout;
815 }
816
817 u32
818 nat64_get_tcp_est_timeout (void)
819 {
820   nat64_main_t *nm = &nat64_main;
821
822   return nm->tcp_est_timeout;
823 }
824
825 u32
826 nat64_get_tcp_incoming_syn_timeout (void)
827 {
828   nat64_main_t *nm = &nat64_main;
829
830   return nm->tcp_incoming_syn_timeout;
831 }
832
833 void
834 nat64_session_reset_timeout (nat64_db_st_entry_t * ste, vlib_main_t * vm)
835 {
836   nat64_main_t *nm = &nat64_main;
837   u32 now = (u32) vlib_time_now (vm);
838
839   switch (ip_proto_to_snat_proto (ste->proto))
840     {
841     case SNAT_PROTOCOL_ICMP:
842       ste->expire = now + nm->icmp_timeout;
843       return;
844     case SNAT_PROTOCOL_TCP:
845       {
846         switch (ste->tcp_state)
847           {
848           case NAT64_TCP_STATE_V4_INIT:
849           case NAT64_TCP_STATE_V6_INIT:
850           case NAT64_TCP_STATE_V4_FIN_RCV:
851           case NAT64_TCP_STATE_V6_FIN_RCV:
852           case NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV:
853           case NAT64_TCP_STATE_TRANS:
854             ste->expire = now + nm->tcp_trans_timeout;
855             return;
856           case NAT64_TCP_STATE_ESTABLISHED:
857             ste->expire = now + nm->tcp_est_timeout;
858             return;
859           default:
860             return;
861           }
862       }
863     case SNAT_PROTOCOL_UDP:
864       ste->expire = now + nm->udp_timeout;
865       return;
866     default:
867       ste->expire = now + nm->udp_timeout;
868       return;
869     }
870 }
871
872 void
873 nat64_tcp_session_set_state (nat64_db_st_entry_t * ste, tcp_header_t * tcp,
874                              u8 is_ip6)
875 {
876   switch (ste->tcp_state)
877     {
878     case NAT64_TCP_STATE_CLOSED:
879       {
880         if (tcp->flags & TCP_FLAG_SYN)
881           {
882             if (is_ip6)
883               ste->tcp_state = NAT64_TCP_STATE_V6_INIT;
884             else
885               ste->tcp_state = NAT64_TCP_STATE_V4_INIT;
886           }
887         return;
888       }
889     case NAT64_TCP_STATE_V4_INIT:
890       {
891         if (is_ip6 && (tcp->flags & TCP_FLAG_SYN))
892           ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
893         return;
894       }
895     case NAT64_TCP_STATE_V6_INIT:
896       {
897         if (!is_ip6 && (tcp->flags & TCP_FLAG_SYN))
898           ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
899         return;
900       }
901     case NAT64_TCP_STATE_ESTABLISHED:
902       {
903         if (tcp->flags & TCP_FLAG_FIN)
904           {
905             if (is_ip6)
906               ste->tcp_state = NAT64_TCP_STATE_V6_FIN_RCV;
907             else
908               ste->tcp_state = NAT64_TCP_STATE_V4_FIN_RCV;
909           }
910         else if (tcp->flags & TCP_FLAG_RST)
911           {
912             ste->tcp_state = NAT64_TCP_STATE_TRANS;
913           }
914         return;
915       }
916     case NAT64_TCP_STATE_V4_FIN_RCV:
917       {
918         if (is_ip6 && (tcp->flags & TCP_FLAG_FIN))
919           ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
920         return;
921       }
922     case NAT64_TCP_STATE_V6_FIN_RCV:
923       {
924         if (!is_ip6 && (tcp->flags & TCP_FLAG_FIN))
925           ste->tcp_state = NAT64_TCP_STATE_V6_FIN_V4_FIN_RCV;
926         return;
927       }
928     case NAT64_TCP_STATE_TRANS:
929       {
930         if (!(tcp->flags & TCP_FLAG_RST))
931           ste->tcp_state = NAT64_TCP_STATE_ESTABLISHED;
932         return;
933       }
934     default:
935       return;
936     }
937 }
938
939 int
940 nat64_add_del_prefix (ip6_address_t * prefix, u8 plen, u32 vrf_id, u8 is_add)
941 {
942   nat64_main_t *nm = &nat64_main;
943   nat64_prefix_t *p = 0;
944   int i;
945
946   /* Verify prefix length */
947   if (plen != 32 && plen != 40 && plen != 48 && plen != 56 && plen != 64
948       && plen != 96)
949     return VNET_API_ERROR_INVALID_VALUE;
950
951   /* Check if tenant already have prefix */
952   for (i = 0; i < vec_len (nm->pref64); i++)
953     {
954       if (nm->pref64[i].vrf_id == vrf_id)
955         {
956           p = nm->pref64 + i;
957           break;
958         }
959     }
960
961   if (is_add)
962     {
963       if (!p)
964         {
965           vec_add2 (nm->pref64, p, 1);
966           p->fib_index =
967             fib_table_find_or_create_and_lock (FIB_PROTOCOL_IP6, vrf_id,
968                                                FIB_SOURCE_PLUGIN_HI);
969           p->vrf_id = vrf_id;
970         }
971
972       p->prefix.as_u64[0] = prefix->as_u64[0];
973       p->prefix.as_u64[1] = prefix->as_u64[1];
974       p->plen = plen;
975     }
976   else
977     {
978       if (!p)
979         return VNET_API_ERROR_NO_SUCH_ENTRY;
980
981       vec_del1 (nm->pref64, i);
982     }
983
984   return 0;
985 }
986
987 void
988 nat64_prefix_walk (nat64_prefix_walk_fn_t fn, void *ctx)
989 {
990   nat64_main_t *nm = &nat64_main;
991   nat64_prefix_t *p = 0;
992
993   /* *INDENT-OFF* */
994   vec_foreach (p, nm->pref64)
995     {
996       if (fn (p, ctx))
997         break;
998     };
999   /* *INDENT-ON* */
1000 }
1001
1002 void
1003 nat64_compose_ip6 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
1004 {
1005   nat64_main_t *nm = &nat64_main;
1006   nat64_prefix_t *p, *gp = 0, *prefix = 0;
1007
1008   /* *INDENT-OFF* */
1009   vec_foreach (p, nm->pref64)
1010     {
1011       if (p->fib_index == fib_index)
1012         {
1013           prefix = p;
1014           break;
1015         }
1016
1017       if (p->fib_index == 0)
1018         gp = p;
1019     };
1020   /* *INDENT-ON* */
1021
1022   if (!prefix)
1023     prefix = gp;
1024
1025   if (prefix)
1026     {
1027       clib_memcpy (ip6, &p->prefix, sizeof (ip6_address_t));
1028       switch (p->plen)
1029         {
1030         case 32:
1031           ip6->as_u32[1] = ip4->as_u32;
1032           break;
1033         case 40:
1034           ip6->as_u8[5] = ip4->as_u8[0];
1035           ip6->as_u8[6] = ip4->as_u8[1];
1036           ip6->as_u8[7] = ip4->as_u8[2];
1037           ip6->as_u8[9] = ip4->as_u8[3];
1038           break;
1039         case 48:
1040           ip6->as_u8[6] = ip4->as_u8[0];
1041           ip6->as_u8[7] = ip4->as_u8[1];
1042           ip6->as_u8[9] = ip4->as_u8[2];
1043           ip6->as_u8[10] = ip4->as_u8[3];
1044           break;
1045         case 56:
1046           ip6->as_u8[7] = ip4->as_u8[0];
1047           ip6->as_u8[9] = ip4->as_u8[1];
1048           ip6->as_u8[10] = ip4->as_u8[2];
1049           ip6->as_u8[11] = ip4->as_u8[3];
1050           break;
1051         case 64:
1052           ip6->as_u8[9] = ip4->as_u8[0];
1053           ip6->as_u8[10] = ip4->as_u8[1];
1054           ip6->as_u8[11] = ip4->as_u8[2];
1055           ip6->as_u8[12] = ip4->as_u8[3];
1056           break;
1057         case 96:
1058           ip6->as_u32[3] = ip4->as_u32;
1059           break;
1060         default:
1061           clib_warning ("invalid prefix length");
1062           break;
1063         }
1064     }
1065   else
1066     {
1067       clib_memcpy (ip6, well_known_prefix, sizeof (ip6_address_t));
1068       ip6->as_u32[3] = ip4->as_u32;
1069     }
1070 }
1071
1072 void
1073 nat64_extract_ip4 (ip6_address_t * ip6, ip4_address_t * ip4, u32 fib_index)
1074 {
1075   nat64_main_t *nm = &nat64_main;
1076   nat64_prefix_t *p, *gp = 0;
1077   u8 plen = 0;
1078
1079   /* *INDENT-OFF* */
1080   vec_foreach (p, nm->pref64)
1081     {
1082       if (p->fib_index == fib_index)
1083         {
1084           plen = p->plen;
1085           break;
1086         }
1087
1088       if (p->vrf_id == 0)
1089         gp = p;
1090     };
1091   /* *INDENT-ON* */
1092
1093   if (!plen)
1094     {
1095       if (gp)
1096         plen = gp->plen;
1097       else
1098         plen = 96;
1099     }
1100
1101   switch (plen)
1102     {
1103     case 32:
1104       ip4->as_u32 = ip6->as_u32[1];
1105       break;
1106     case 40:
1107       ip4->as_u8[0] = ip6->as_u8[5];
1108       ip4->as_u8[1] = ip6->as_u8[6];
1109       ip4->as_u8[2] = ip6->as_u8[7];
1110       ip4->as_u8[3] = ip6->as_u8[9];
1111       break;
1112     case 48:
1113       ip4->as_u8[0] = ip6->as_u8[6];
1114       ip4->as_u8[1] = ip6->as_u8[7];
1115       ip4->as_u8[2] = ip6->as_u8[9];
1116       ip4->as_u8[3] = ip6->as_u8[10];
1117       break;
1118     case 56:
1119       ip4->as_u8[0] = ip6->as_u8[7];
1120       ip4->as_u8[1] = ip6->as_u8[9];
1121       ip4->as_u8[2] = ip6->as_u8[10];
1122       ip4->as_u8[3] = ip6->as_u8[11];
1123       break;
1124     case 64:
1125       ip4->as_u8[0] = ip6->as_u8[9];
1126       ip4->as_u8[1] = ip6->as_u8[10];
1127       ip4->as_u8[2] = ip6->as_u8[11];
1128       ip4->as_u8[3] = ip6->as_u8[12];
1129       break;
1130     case 96:
1131       ip4->as_u32 = ip6->as_u32[3];
1132       break;
1133     default:
1134       clib_warning ("invalid prefix length");
1135       break;
1136     }
1137 }
1138
1139 /**
1140  * @brief Per worker process checking expire time for NAT64 sessions.
1141  */
1142 static uword
1143 nat64_expire_worker_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1144                              vlib_frame_t * f)
1145 {
1146   nat64_main_t *nm = &nat64_main;
1147   u32 thread_index = vlib_get_thread_index ();
1148   nat64_db_t *db = &nm->db[thread_index];
1149   u32 now = (u32) vlib_time_now (vm);
1150
1151   nad64_db_st_free_expired (db, now);
1152
1153   return 0;
1154 }
1155
1156 static vlib_node_registration_t nat64_expire_worker_walk_node;
1157
1158 /* *INDENT-OFF* */
1159 VLIB_REGISTER_NODE (nat64_expire_worker_walk_node, static) = {
1160     .function = nat64_expire_worker_walk_fn,
1161     .type = VLIB_NODE_TYPE_INPUT,
1162     .state = VLIB_NODE_STATE_INTERRUPT,
1163     .name = "nat64-expire-worker-walk",
1164 };
1165 /* *INDENT-ON* */
1166
1167 /**
1168  * @brief Centralized process to drive per worker expire walk.
1169  */
1170 static uword
1171 nat64_expire_walk_fn (vlib_main_t * vm, vlib_node_runtime_t * rt,
1172                       vlib_frame_t * f)
1173 {
1174   vlib_main_t **worker_vms = 0, *worker_vm;
1175   int i;
1176
1177   if (vec_len (vlib_mains) == 0)
1178     vec_add1 (worker_vms, vm);
1179   else
1180     {
1181       for (i = 0; i < vec_len (vlib_mains); i++)
1182         {
1183           worker_vm = vlib_mains[i];
1184           if (worker_vm)
1185             vec_add1 (worker_vms, worker_vm);
1186         }
1187     }
1188
1189   while (1)
1190     {
1191       vlib_process_wait_for_event_or_clock (vm, 10.0);
1192       vlib_process_get_events (vm, NULL);
1193       for (i = 0; i < vec_len (worker_vms); i++)
1194         {
1195           worker_vm = worker_vms[i];
1196           vlib_node_set_interrupt_pending (worker_vm,
1197                                            nat64_expire_worker_walk_node.index);
1198         }
1199     }
1200
1201   return 0;
1202 }
1203
1204 static vlib_node_registration_t nat64_expire_walk_node;
1205
1206 /* *INDENT-OFF* */
1207 VLIB_REGISTER_NODE (nat64_expire_walk_node, static) = {
1208     .function = nat64_expire_walk_fn,
1209     .type = VLIB_NODE_TYPE_PROCESS,
1210     .name = "nat64-expire-walk",
1211 };
1212 /* *INDENT-ON* */
1213
1214 /*
1215  * fd.io coding-style-patch-verification: ON
1216  *
1217  * Local Variables:
1218  * eval: (c-set-style "gnu")
1219  * End:
1220  */