2019-02-21 22:19:17 +00:00
|
|
|
/* -*- P4_16 -*- */
|
|
|
|
#include <core.p4>
|
|
|
|
#include <v1model.p4>
|
|
|
|
|
|
|
|
#include "headers.p4"
|
|
|
|
#include "parsers.p4"
|
|
|
|
#include "checksums.p4"
|
|
|
|
#include "settings.p4"
|
|
|
|
|
|
|
|
|
|
|
|
/*************************************************************************
|
|
|
|
************** I N G R E S S P R O C E S S I N G *******************
|
|
|
|
*************************************************************************/
|
|
|
|
|
|
|
|
control MyIngress(inout headers hdr,
|
2019-02-23 13:22:46 +00:00
|
|
|
inout metadata meta,
|
|
|
|
inout standard_metadata_t standard_metadata) {
|
2019-02-21 22:19:17 +00:00
|
|
|
|
2019-03-25 11:56:54 +00:00
|
|
|
/********************** GENERAL ACTIONS ***********************************/
|
2019-02-28 09:56:22 +00:00
|
|
|
|
|
|
|
action drop() {
|
|
|
|
mark_to_drop();
|
|
|
|
}
|
|
|
|
|
2019-03-04 13:07:05 +00:00
|
|
|
action set_egress_port (port_t out_port) {
|
|
|
|
standard_metadata.egress_spec = out_port;
|
|
|
|
}
|
|
|
|
|
2019-03-04 15:23:28 +00:00
|
|
|
action controller_reply(task_t task) {
|
|
|
|
meta.task = task;
|
2019-03-04 17:10:24 +00:00
|
|
|
meta.ingress_port = standard_metadata.ingress_port;
|
2019-03-03 21:36:25 +00:00
|
|
|
clone3(CloneType.I2E, 100, meta);
|
|
|
|
}
|
|
|
|
|
2019-03-25 12:43:47 +00:00
|
|
|
action controller_debug_table_id(table_t table_id) {
|
2019-03-25 13:16:14 +00:00
|
|
|
meta.table_id = table_id;
|
2019-03-25 12:43:47 +00:00
|
|
|
controller_reply(TASK_DEBUG);
|
|
|
|
}
|
|
|
|
|
2019-03-25 12:13:02 +00:00
|
|
|
action controller_debug() {
|
|
|
|
controller_reply(TASK_DEBUG);
|
|
|
|
}
|
|
|
|
|
2019-03-04 13:07:05 +00:00
|
|
|
action multicast_pkg(mcast_t mcast_grp) { /* Output PKG on correct ports (plural) */
|
2019-02-26 14:30:47 +00:00
|
|
|
standard_metadata.mcast_grp = mcast_grp;
|
|
|
|
}
|
|
|
|
|
2019-03-05 21:31:05 +00:00
|
|
|
|
2019-03-14 13:39:17 +00:00
|
|
|
/********************** NAT64 / NAT46 ACTIONS ***********************************/
|
2019-03-14 13:05:17 +00:00
|
|
|
|
2019-03-27 18:43:49 +00:00
|
|
|
/* changes for icmp6 -> icmp */
|
2019-03-27 19:08:49 +00:00
|
|
|
action nat64_icmp6_generic()
|
2019-03-27 12:55:07 +00:00
|
|
|
{
|
2019-03-27 17:01:11 +00:00
|
|
|
hdr.icmp.setValid();
|
2019-03-27 12:55:07 +00:00
|
|
|
hdr.ipv4.protocol = PROTO_ICMP; // overwrite generic same protocol assumption
|
2019-03-27 17:01:11 +00:00
|
|
|
|
|
|
|
/* trigger checksumming */
|
|
|
|
meta.switch_task = TASK_CHECKSUM_ICMP;
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
meta.chk_icmp = true;
|
|
|
|
|
2019-03-27 17:01:11 +00:00
|
|
|
hdr.icmp6.setInvalid();
|
|
|
|
|
|
|
|
/* not needed, as we don't translate them (yet/ever) */
|
|
|
|
hdr.icmp6_na_ns.setInvalid();
|
|
|
|
hdr.icmp6_option_link_layer_addr.setInvalid();
|
2019-03-27 12:55:07 +00:00
|
|
|
}
|
|
|
|
|
2019-03-14 13:05:17 +00:00
|
|
|
/* NAT64 protocol unspecific changes */
|
|
|
|
action nat64_generic(ipv4_addr_t src, ipv4_addr_t dst) {
|
2019-03-27 12:26:50 +00:00
|
|
|
hdr.ipv4.setValid();
|
|
|
|
|
2019-03-14 13:05:17 +00:00
|
|
|
/* Stuff that might need to be fixed */
|
|
|
|
hdr.ipv4.version = (bit<4>)4;
|
|
|
|
hdr.ipv4.diff_serv = (bit<6>)0; // no ToS
|
|
|
|
hdr.ipv4.ecn = (bit<2>)0; // unsupported
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
/* 5 is ok as long as we don't use options / padding /
|
|
|
|
anything after the destination address */
|
|
|
|
hdr.ipv4.ihl = (bit<4>) 5; // internet header length - static for us
|
|
|
|
hdr.ipv4.totalLen = (bit<16>) hdr.ipv6.payload_length + 5; // ok under above constraints
|
2019-03-14 13:05:17 +00:00
|
|
|
|
|
|
|
hdr.ipv4.identification = (bit<16>) 0; // no support for fragments
|
|
|
|
hdr.ipv4.flags = (bit<3>) 0; // DF bit and more fragments, unsupported ATM
|
|
|
|
hdr.ipv4.fragOffset = (bit<13>) 0; // 0 as there are no fragments
|
|
|
|
|
|
|
|
/* Stuff that should be fine */
|
|
|
|
hdr.ethernet.ethertype = TYPE_IPV4;
|
|
|
|
|
|
|
|
hdr.ipv4.dst_addr = dst;
|
|
|
|
hdr.ipv4.src_addr = src;
|
|
|
|
|
|
|
|
hdr.ipv4.ttl = hdr.ipv6.hop_limit;
|
2019-03-27 12:49:39 +00:00
|
|
|
|
2019-03-14 13:05:17 +00:00
|
|
|
hdr.ipv4.protocol = hdr.ipv6.next_header;
|
|
|
|
|
|
|
|
hdr.ipv6.setInvalid();
|
|
|
|
}
|
|
|
|
|
2019-03-27 19:15:31 +00:00
|
|
|
/* nat64_prefix is the same as the matching key, but without the mask */
|
|
|
|
action nat64_static(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
|
|
|
ipv6_addr_t src_offset = hdr.ipv6.src_addr - v6_src;
|
|
|
|
ipv4_addr_t src = v4_dst + (ipv4_addr_t) src_offset;
|
|
|
|
|
|
|
|
ipv4_addr_t dst = (ipv4_addr_t) (hdr.ipv6.dst_addr - nat64_prefix);
|
|
|
|
|
|
|
|
nat64_generic(src, dst);
|
|
|
|
}
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
/* From https://tools.ietf.org/html/rfc792 (IPv4)
|
|
|
|
|
|
|
|
Echo or Echo Reply Message
|
|
|
|
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Type | Code | Checksum |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Identifier | Sequence Number |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Data ...
|
|
|
|
+-+-+-+-+-
|
|
|
|
|
|
|
|
|
|
|
|
From https://tools.ietf.org/html/rfc4443#section-4.1
|
|
|
|
|
|
|
|
4.1. Echo Request Message
|
|
|
|
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Type | Code | Checksum |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Identifier | Sequence Number |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Data ...
|
|
|
|
+-+-+-+-+-
|
|
|
|
|
|
|
|
4.2. Echo Reply Message
|
|
|
|
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Type | Code | Checksum |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Identifier | Sequence Number |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| Data ...
|
|
|
|
+-+-+-+-+-
|
|
|
|
|
|
|
|
|
|
|
|
Type / code are different in ICMP4 and ICMP6!
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
2019-03-27 19:12:56 +00:00
|
|
|
/* if replacing actions */
|
|
|
|
action nat64_icmp6_echo_request(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
|
|
|
nat64_static(v6_src, v4_dst, nat64_prefix);
|
|
|
|
nat64_icmp6_generic();
|
|
|
|
|
|
|
|
hdr.icmp.type = ICMP_ECHO_REQUEST;
|
2019-03-30 13:59:46 +00:00
|
|
|
|
|
|
|
/* fix length, sequence number, etc */
|
2019-03-27 19:12:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
action nat64_icmp6_echo_reply(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
|
|
|
nat64_static(v6_src, v4_dst, nat64_prefix);
|
|
|
|
nat64_icmp6_generic();
|
|
|
|
|
|
|
|
hdr.icmp.type = ICMP_ECHO_REPLY;
|
|
|
|
}
|
|
|
|
|
2019-03-14 13:05:17 +00:00
|
|
|
/* NAT46: protocol unspecific changes */
|
|
|
|
action nat46_generic(ipv6_addr_t src, ipv6_addr_t dst) {
|
2019-03-27 12:26:50 +00:00
|
|
|
hdr.ipv6.setValid();
|
2019-03-27 18:43:49 +00:00
|
|
|
hdr.ipv4.setInvalid();
|
|
|
|
|
2019-03-25 13:28:36 +00:00
|
|
|
hdr.ethernet.ethertype = TYPE_IPV6;
|
2019-03-14 13:05:17 +00:00
|
|
|
|
|
|
|
hdr.ipv6.dst_addr = dst;
|
|
|
|
hdr.ipv6.src_addr = src;
|
|
|
|
|
|
|
|
hdr.ipv6.version = (bit<4>)6;
|
|
|
|
hdr.ipv6.traffic_class = (bit<8>) hdr.ipv4.diff_serv;
|
|
|
|
hdr.ipv6.flow_label = (bit<20>) 0;
|
|
|
|
hdr.ipv6.payload_length = (bit<16>) hdr.ipv4.totalLen - 20;
|
|
|
|
|
|
|
|
hdr.ipv6.next_header = hdr.ipv4.protocol;
|
|
|
|
hdr.ipv6.hop_limit = hdr.ipv4.ttl;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-03-23 15:20:13 +00:00
|
|
|
|
2019-03-27 18:43:49 +00:00
|
|
|
action nat46_icmp_echo_request(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
|
|
|
; /* TBD */
|
|
|
|
}
|
|
|
|
|
|
|
|
action nat46_icmp_echo_reply(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
|
|
|
; /* TBD */
|
2019-03-14 13:39:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* matching key: v4_network specified again */
|
2019-03-23 15:20:13 +00:00
|
|
|
action nat46_static(ipv6_addr_t v6_src, ipv4_addr_t v4_dst, ipv6_addr_t nat64_prefix) {
|
2019-03-14 13:39:17 +00:00
|
|
|
ipv6_addr_t src = nat64_prefix + (ipv6_addr_t) hdr.ipv4.src_addr;
|
|
|
|
|
2019-03-23 15:20:13 +00:00
|
|
|
ipv4_addr_t dst_offset = hdr.ipv4.dst_addr - v4_dst;
|
|
|
|
ipv6_addr_t dst = v6_src + (ipv6_addr_t) dst_offset;
|
2019-03-14 13:39:17 +00:00
|
|
|
|
|
|
|
nat46_generic(src, dst);
|
2019-03-23 15:20:13 +00:00
|
|
|
}
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
table nat64 {
|
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: lpm;
|
|
|
|
}
|
|
|
|
actions = { /* FIXME: actions need to be updated */
|
|
|
|
controller_debug;
|
|
|
|
nat64_generic;
|
|
|
|
nat64_icmp6_echo_reply;
|
|
|
|
nat64_icmp6_echo_request;
|
|
|
|
controller_debug_table_id;
|
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NAT64_TABLE_SIZE;
|
|
|
|
default_action = controller_debug_table_id(TABLE_NAT64);
|
|
|
|
}
|
|
|
|
|
2019-03-27 18:43:49 +00:00
|
|
|
table nat64_icmp6 {
|
2019-03-23 15:20:13 +00:00
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: lpm;
|
2019-03-27 18:43:49 +00:00
|
|
|
hdr.icmp6.type: exact;
|
2019-03-23 15:20:13 +00:00
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
controller_debug;
|
2019-03-27 18:43:49 +00:00
|
|
|
nat64_icmp6_echo_reply;
|
|
|
|
nat64_icmp6_echo_request;
|
2019-03-25 13:16:14 +00:00
|
|
|
controller_debug_table_id;
|
2019-03-23 15:20:13 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NAT64_TABLE_SIZE;
|
2019-03-25 13:16:14 +00:00
|
|
|
default_action = controller_debug_table_id(TABLE_NAT64);
|
2019-03-14 13:39:17 +00:00
|
|
|
}
|
|
|
|
|
2019-03-27 18:43:49 +00:00
|
|
|
table nat46_icmp {
|
2019-03-23 15:20:13 +00:00
|
|
|
key = {
|
|
|
|
hdr.ipv4.dst_addr: lpm;
|
2019-03-27 18:43:49 +00:00
|
|
|
hdr.icmp.type: exact;
|
2019-03-23 15:20:13 +00:00
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
controller_debug;
|
2019-03-27 18:43:49 +00:00
|
|
|
nat46_icmp_echo_reply;
|
|
|
|
nat46_icmp_echo_request;
|
2019-03-25 13:16:14 +00:00
|
|
|
controller_debug_table_id;
|
2019-03-23 15:20:13 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NAT64_TABLE_SIZE;
|
2019-03-25 13:16:14 +00:00
|
|
|
default_action = controller_debug_table_id(TABLE_NAT46);
|
2019-03-23 15:20:13 +00:00
|
|
|
}
|
2019-03-14 13:39:17 +00:00
|
|
|
|
2019-03-23 14:03:42 +00:00
|
|
|
|
|
|
|
/********************** ICMP6 ***********************************/
|
|
|
|
|
|
|
|
/* old/unused action */
|
|
|
|
action icmp6_answer() {
|
|
|
|
if(hdr.icmp6.isValid()) {
|
|
|
|
if(hdr.icmp6.code == ICMP6_ECHO_REQUEST) {
|
|
|
|
ipv6_addr_t tmp = hdr.ipv6.src_addr;
|
|
|
|
hdr.ipv6.src_addr = hdr.ipv6.dst_addr;
|
|
|
|
hdr.ipv6.dst_addr = tmp;
|
|
|
|
hdr.icmp6.code = ICMP6_ECHO_REPLY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
action icmp6_neighbor_solicitation(ipv6_addr_t addr, mac_addr_t mac_addr) {
|
|
|
|
/* egress = ingress */
|
|
|
|
standard_metadata.egress_spec = standard_metadata.ingress_port;
|
|
|
|
|
|
|
|
/* 1. IPv6 changes */
|
|
|
|
hdr.ipv6.dst_addr = hdr.ipv6.src_addr;
|
|
|
|
hdr.ipv6.src_addr = addr;
|
|
|
|
|
|
|
|
/* 2. ICMP6 changes */
|
|
|
|
hdr.icmp6.type = ICMP6_NA;
|
|
|
|
hdr.icmp6.code = 0;
|
2019-03-25 11:56:54 +00:00
|
|
|
hdr.icmp6.checksum = 42; // checksum is calculated in deparser - marking with 42 to see whether it is calculated
|
2019-03-23 14:03:42 +00:00
|
|
|
|
|
|
|
/* 3. icmp6/neighbor advertisement: values taken from real world answers */
|
|
|
|
hdr.icmp6_na_ns.router = 0;
|
|
|
|
hdr.icmp6_na_ns.solicitated = 1;
|
|
|
|
hdr.icmp6_na_ns.override = 1;
|
|
|
|
hdr.icmp6_na_ns.reserved = 0;
|
|
|
|
hdr.icmp6_na_ns.target_addr = addr;
|
|
|
|
|
|
|
|
/* 4. Link layer options */
|
|
|
|
hdr.icmp6_option_link_layer_addr.type = ICMP6_NDP_OPT_TARGET_LL;
|
|
|
|
hdr.icmp6_option_link_layer_addr.ll_length = 1; /* 1* 64 bit */
|
|
|
|
hdr.icmp6_option_link_layer_addr.mac_addr = mac_addr;
|
|
|
|
|
|
|
|
/* version1: rebuilding packet */
|
|
|
|
/*
|
|
|
|
truncate((bit<32>)(112 + 320 + 32)/8);
|
|
|
|
hdr.icmp6_na.setValid();
|
|
|
|
|
|
|
|
hdr.icmp6_na.solicitated = 1;
|
|
|
|
hdr.icmp6_na.override = 1;
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* checksum trigger / content */
|
2019-03-25 12:02:09 +00:00
|
|
|
meta.switch_task = TASK_CHECKSUM_ICMP6_NA;
|
2019-03-23 14:03:42 +00:00
|
|
|
meta.cast_length = (bit<32>) hdr.ipv6.payload_length;
|
|
|
|
}
|
|
|
|
|
|
|
|
action icmp6_echo_reply() {
|
|
|
|
mac_addr_t mac_tmp = hdr.ethernet.dst_addr;
|
|
|
|
hdr.ethernet.dst_addr = hdr.ethernet.src_addr;
|
|
|
|
hdr.ethernet.src_addr = mac_tmp;
|
|
|
|
|
|
|
|
ipv6_addr_t addr_tmp = hdr.ipv6.dst_addr;
|
|
|
|
hdr.ipv6.dst_addr = hdr.ipv6.src_addr;
|
|
|
|
hdr.ipv6.src_addr = addr_tmp;
|
|
|
|
|
|
|
|
hdr.icmp6.type = ICMP6_ECHO_REPLY;
|
|
|
|
|
2019-03-25 12:02:09 +00:00
|
|
|
meta.switch_task = TASK_CHECKSUM_ICMP6;
|
2019-03-23 14:03:42 +00:00
|
|
|
meta.cast_length = (bit<32>) hdr.ipv6.payload_length;
|
|
|
|
}
|
|
|
|
|
|
|
|
table icmp6 {
|
2019-02-28 09:56:22 +00:00
|
|
|
key = {
|
2019-03-23 14:03:42 +00:00
|
|
|
hdr.ipv6.dst_addr: lpm;
|
2019-02-28 09:56:22 +00:00
|
|
|
hdr.icmp6.type: exact;
|
|
|
|
}
|
|
|
|
actions = {
|
2019-03-04 13:07:05 +00:00
|
|
|
controller_debug;
|
2019-02-28 09:57:00 +00:00
|
|
|
icmp6_neighbor_solicitation;
|
2019-03-23 14:03:42 +00:00
|
|
|
icmp6_echo_reply;
|
2019-03-25 12:57:09 +00:00
|
|
|
controller_debug_table_id;
|
2019-02-28 09:56:22 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
2019-03-23 14:03:42 +00:00
|
|
|
size = ICMP6_TABLE_SIZE;
|
2019-03-25 12:57:09 +00:00
|
|
|
default_action = controller_debug_table_id(TABLE_ICMP6);
|
|
|
|
// default_action = NoAction;
|
2019-02-28 09:56:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/********************** debugging / general support ***********************************/
|
|
|
|
|
|
|
|
table port2mcast {
|
|
|
|
key = {
|
|
|
|
standard_metadata.ingress_port : exact;
|
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
multicast_pkg;
|
2019-03-04 13:07:05 +00:00
|
|
|
controller_debug;
|
2019-02-28 09:56:22 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NDP_TABLE_SIZE;
|
|
|
|
default_action = NoAction;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handle multicast registration of NDP */
|
|
|
|
table addr2mcast {
|
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: exact;
|
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
multicast_pkg;
|
2019-03-04 13:07:05 +00:00
|
|
|
controller_debug;
|
2019-02-28 09:56:22 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NDP_TABLE_SIZE;
|
|
|
|
default_action = NoAction;
|
|
|
|
}
|
|
|
|
|
2019-03-23 14:03:42 +00:00
|
|
|
/********************** NDP support for OTHERS (unused ATM) ***********************************/
|
2019-02-28 09:56:22 +00:00
|
|
|
|
2019-02-26 14:30:47 +00:00
|
|
|
table ndp {
|
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: lpm;
|
|
|
|
standard_metadata.ingress_port : exact;
|
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
multicast_pkg;
|
2019-03-04 13:07:05 +00:00
|
|
|
controller_debug;
|
2019-02-26 14:30:47 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = NDP_TABLE_SIZE;
|
2019-03-25 12:43:47 +00:00
|
|
|
default_action = NoAction;
|
2019-02-26 14:30:47 +00:00
|
|
|
}
|
|
|
|
|
2019-02-24 14:53:10 +00:00
|
|
|
|
2019-03-04 13:07:05 +00:00
|
|
|
|
|
|
|
/********************** ROUTING (egress definiton) TABLES ***********************************/
|
|
|
|
|
2019-02-23 17:58:04 +00:00
|
|
|
table v6_addresses {
|
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: exact;
|
|
|
|
}
|
|
|
|
actions = {
|
2019-03-04 13:07:05 +00:00
|
|
|
controller_debug;
|
2019-03-03 21:37:58 +00:00
|
|
|
controller_reply;
|
2019-03-05 21:33:03 +00:00
|
|
|
icmp6_echo_reply;
|
2019-02-23 17:58:04 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = ADDRESS_TABLE_SIZE;
|
2019-02-26 14:53:48 +00:00
|
|
|
default_action = NoAction;
|
2019-02-23 17:58:04 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-03-04 13:07:05 +00:00
|
|
|
table v6_networks {
|
2019-02-23 13:22:46 +00:00
|
|
|
key = {
|
|
|
|
hdr.ipv6.dst_addr: lpm;
|
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
set_egress_port;
|
2019-03-04 13:10:11 +00:00
|
|
|
controller_debug;
|
|
|
|
controller_reply;
|
2019-03-25 12:57:09 +00:00
|
|
|
controller_debug_table_id;
|
2019-02-23 13:22:46 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = ROUTING_TABLE_SIZE;
|
2019-03-25 12:57:09 +00:00
|
|
|
default_action = controller_debug_table_id(TABLE_V6_NETWORKS);
|
2019-02-23 13:22:46 +00:00
|
|
|
}
|
2019-02-21 22:19:17 +00:00
|
|
|
|
2019-03-04 15:38:06 +00:00
|
|
|
table v4_networks {
|
2019-02-23 13:22:46 +00:00
|
|
|
key = {
|
|
|
|
hdr.ipv4.dst_addr: lpm;
|
|
|
|
}
|
|
|
|
actions = {
|
|
|
|
set_egress_port;
|
2019-03-25 12:09:29 +00:00
|
|
|
controller_debug;
|
2019-03-25 12:51:08 +00:00
|
|
|
controller_debug_table_id;
|
2019-02-23 13:22:46 +00:00
|
|
|
NoAction;
|
|
|
|
}
|
|
|
|
size = ROUTING_TABLE_SIZE;
|
2019-03-25 12:50:29 +00:00
|
|
|
default_action = controller_debug_table_id(TABLE_V4_NETWORKS);
|
2019-02-23 13:22:46 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 09:56:22 +00:00
|
|
|
/********************** APPLYING TABLES ***********************************/
|
2019-03-27 17:59:35 +00:00
|
|
|
apply {
|
|
|
|
if(hdr.ipv6.isValid()) {
|
|
|
|
icmp6.apply(); /* icmp6 echo, icmp6 ndp */
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
if(nat64.apply().hit) { /* generic nat64 done */
|
|
|
|
if(hdr.icmp6.isValid()) {
|
|
|
|
nat64_icmp6_generic();
|
|
|
|
|
|
|
|
if(hdr.icmp6.type == ICMP6_ECHO_REPLY) {
|
|
|
|
hdr.icmp.type = ICMP_ECHO_REPLY;
|
|
|
|
}
|
|
|
|
if(hdr.icmp6.type == ICMP6_ECHO_REQUEST) {
|
|
|
|
hdr.icmp.type = ICMP_ECHO_REQUEST;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-27 18:43:49 +00:00
|
|
|
v4_networks.apply(); /* apply egress for IPv4 */
|
|
|
|
exit; /* no further v6 processing */
|
2019-03-27 17:59:35 +00:00
|
|
|
}
|
|
|
|
|
2019-03-30 13:59:46 +00:00
|
|
|
v6_networks.apply(); /* regular egress / routing */
|
2019-03-27 12:32:14 +00:00
|
|
|
} else if(hdr.ipv4.isValid()) {
|
2019-03-30 13:59:46 +00:00
|
|
|
// if(nat46_icmp.apply().hit) { /* v4->v6 */
|
|
|
|
// v6_networks.apply(); /* Now apply v6 egress */
|
|
|
|
// exit; /* no further v4 processing */
|
|
|
|
// }
|
2019-03-27 12:32:14 +00:00
|
|
|
v4_networks.apply(); /* routing, egress */
|
2019-02-23 13:29:36 +00:00
|
|
|
}
|
2019-02-21 22:19:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-27 17:59:35 +00:00
|
|
|
// if(nat64.apply().hit) { /* translating */
|
|
|
|
|
2019-02-21 22:19:17 +00:00
|
|
|
/*************************************************************************
|
|
|
|
**************** E G R E S S P R O C E S S I N G *******************
|
|
|
|
*************************************************************************/
|
|
|
|
|
|
|
|
control MyEgress(inout headers hdr,
|
|
|
|
inout metadata meta,
|
|
|
|
inout standard_metadata_t standard_metadata) {
|
|
|
|
apply {
|
2019-03-04 13:27:12 +00:00
|
|
|
// ingress clone
|
2019-03-04 15:24:37 +00:00
|
|
|
if (standard_metadata.instance_type == 1){
|
2019-03-04 15:23:28 +00:00
|
|
|
hdr.cpu.setValid();
|
|
|
|
hdr.cpu.task = meta.task;
|
2019-03-04 17:05:56 +00:00
|
|
|
hdr.cpu.ethertype = hdr.ethernet.ethertype;
|
2019-03-19 22:23:54 +00:00
|
|
|
hdr.cpu.ingress_port = (bit<16>) meta.ingress_port;
|
2019-03-25 13:16:14 +00:00
|
|
|
hdr.cpu.table_id = meta.table_id;
|
2019-03-25 12:43:47 +00:00
|
|
|
|
2019-03-04 17:05:56 +00:00
|
|
|
hdr.ethernet.ethertype = TYPE_CPU;
|
2019-03-03 21:36:25 +00:00
|
|
|
}
|
2019-02-21 22:19:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*************************************************************************
|
|
|
|
*********************** S W I T C H *******************************
|
|
|
|
*************************************************************************/
|
|
|
|
|
|
|
|
V1Switch(
|
|
|
|
MyParser(),
|
|
|
|
MyVerifyChecksum(),
|
|
|
|
MyIngress(),
|
|
|
|
MyEgress(),
|
|
|
|
MyComputeChecksum(),
|
|
|
|
MyDeparser()
|
2019-03-27 12:49:39 +00:00
|
|
|
) main;
|