/* * Copyright (c) 2017 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /** * @file * @brief IPv6 to IPv4 translation */ #ifndef __included_ip6_to_ip4_h__ #define __included_ip6_to_ip4_h__ #include /** * IPv6 to IPv4 set call back function type */ typedef int (*ip6_to_ip4_icmp_set_fn_t) (ip6_header_t * ip6, ip4_header_t * ip4, void *ctx); typedef int (*ip6_to_ip4_tcp_udp_set_fn_t) (vlib_buffer_t * b, ip6_header_t * ip6, ip4_header_t * ip4, void *ctx); /* *INDENT-OFF* */ static u8 icmp6_to_icmp_updater_pointer_table[] = { 0, 1, ~0, ~0, 2, 2, 9, 8, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24 }; /* *INDENT-ON* */ #define frag_id_6to4(id) ((id) ^ ((id) >> 16)) /** * @brief Parse some useful information from IPv6 header. * * @param vm vlib main * @param b vlib buffer * @param ip6 IPv6 header. * @param buff_len Buffer length. * @param l4_protocol L4 protocol number. * @param l4_offset L4 header offset. * @param frag_hdr_offset Fragment header offset if present, 0 otherwise. * * @returns 0 on success, non-zero value otherwise. */ static_always_inline int ip6_parse (vlib_main_t * vm, vlib_buffer_t * b, const ip6_header_t * ip6, u32 buff_len, u8 * l4_protocol, u16 * l4_offset, u16 * frag_hdr_offset) { ip6_ext_header_t *last_hdr, *frag_hdr; u32 length; if (ip6_walk_ext_hdr (vm, b, ip6, IP_PROTOCOL_IPV6_FRAGMENTATION, &length, &frag_hdr, &last_hdr)) { return -1; } if (length > 0) { if (frag_hdr) { *frag_hdr_offset = (u8 *) frag_hdr - (u8 *) ip6; } else { *frag_hdr_offset = 0; } *l4_protocol = last_hdr->next_hdr; } else { *frag_hdr_offset = 0; *l4_protocol = ip6->protocol; } *l4_offset = sizeof (*ip6) + length; return (buff_len < (*l4_offset + 4)) || (clib_net_to_host_u16 (ip6->payload_length) < (*l4_offset + 4 - sizeof (*ip6))); } /** * @brief Get L4 information like port number or ICMP id from IPv6 packet. * * @param ip6 IPv6 header. * @param buffer_len Buffer length. * @param ip_protocol L4 protocol * @param src_port L4 src port or icmp id * @param dst_post L4 dst port or icmp id * @param icmp_type_or_tcp_flags ICMP type or TCP flags, if applicable * @param tcp_ack_number TCP ack number, if applicable * @param tcp_seq_number TCP seq number, if applicable * * @returns 1 on success, 0 otherwise. */ always_inline u16 ip6_get_port (vlib_main_t * vm, vlib_buffer_t * b, ip6_header_t * ip6, u16 buffer_len, u8 * ip_protocol, u16 * src_port, u16 * dst_port, u8 * icmp_type_or_tcp_flags, u32 * tcp_ack_number, u32 * tcp_seq_number) { u8 l4_protocol; u16 l4_offset; u16 frag_offset; u8 *l4; if (ip6_parse (vm, b, ip6, buffer_len, &l4_protocol, &l4_offset, &frag_offset)) return 0; if (frag_offset && ip6_frag_hdr_offset (((ip6_frag_hdr_t *) u8_ptr_add (ip6, frag_offset)))) return 0; //Can't deal with non-first fragment for now if (ip_protocol) { *ip_protocol = l4_protocol; } l4 = u8_ptr_add (ip6, l4_offset); if (l4_protocol == IP_PROTOCOL_TCP || l4_protocol == IP_PROTOCOL_UDP) { if (src_port) *src_port = ((udp_header_t *) (l4))->src_port; if (dst_port) *dst_port = ((udp_header_t *) (l4))->dst_port; if (icmp_type_or_tcp_flags && l4_protocol == IP_PROTOCOL_TCP) *icmp_type_or_tcp_flags = ((tcp_header_t *) (l4))->flags; if (tcp_ack_number && l4_protocol == IP_PROTOCOL_TCP) *tcp_ack_number = ((tcp_header_t *) (l4))->ack_number; if (tcp_seq_number && l4_protocol == IP_PROTOCOL_TCP) *tcp_seq_number = ((tcp_header_t *) (l4))->seq_number; } else if (l4_protocol == IP_PROTOCOL_ICMP6) { icmp46_header_t *icmp = (icmp46_header_t *) (l4); if (icmp_type_or_tcp_flags) *icmp_type_or_tcp_flags = ((icmp46_header_t *) (l4))->type; if (icmp->type == ICMP6_echo_request) { if (src_port) *src_port = ((u16 *) (icmp))[2]; if (dst_port) *dst_port = ((u16 *) (icmp))[2]; } else if (icmp->type == ICMP6_echo_reply) { if (src_port) *src_port = ((u16 *) (icmp))[2]; if (dst_port) *dst_port = ((u16 *) (icmp))[2]; } } return 1; } /** * @brief Convert type and code value from ICMP6 to ICMP4. * * @param icmp ICMP header. * @param inner_ip6 Inner IPv6 header if present, 0 otherwise. * * @returns 0 on success, non-zero value otherwise. */ static_always_inline int icmp6_to_icmp_header (icmp46_header_t * icmp, ip6_header_t ** inner_ip6) { *inner_ip6 = NULL; switch (icmp->type) { case ICMP6_echo_request: icmp->type = ICMP4_echo_request; break; case ICMP6_echo_reply: icmp->type = ICMP4_echo_reply; break; case ICMP6_destination_unreachable: *inner_ip6 = (ip6_header_t *) u8_ptr_add (icmp, 8); switch (icmp->code) { case ICMP6_destination_unreachable_no_route_to_destination: //0 case ICMP6_destination_unreachable_beyond_scope_of_source_address: //2 case ICMP6_destination_unreachable_address_unreachable: //3 icmp->type = ICMP4_destination_unreachable; icmp->code = ICMP4_destination_unreachable_destination_unreachable_host; break; case ICMP6_destination_unreachable_destination_administratively_prohibited: //1 icmp->type = ICMP4_destination_unreachable; icmp->code = ICMP4_destination_unreachable_communication_administratively_prohibited; break; case ICMP6_destination_unreachable_port_unreachable: icmp->type = ICMP4_destination_unreachable; icmp->code = ICMP4_destination_unreachable_port_unreachable; break; default: return -1; } break; case ICMP6_packet_too_big: *inner_ip6 = (ip6_header_t *) u8_ptr_add (icmp, 8); icmp->type = ICMP4_destination_unreachable; icmp->code = 4; { u32 advertised_mtu = clib_net_to_host_u32 (*((u32 *) (icmp + 1))); advertised_mtu -= 20; //FIXME: = minimum(advertised MTU-20, MTU_of_IPv4_nexthop, (MTU_of_IPv6_nexthop)-20) ((u16 *) (icmp))[3] = clib_host_to_net_u16 (advertised_mtu); } break; case ICMP6_time_exceeded: *inner_ip6 = (ip6_header_t *) u8_ptr_add (icmp, 8); icmp->type = ICMP4_time_exceeded; break; case ICMP6_parameter_problem: *inner_ip6 = (ip6_header_t *) u8_ptr_add (icmp, 8); switch (icmp