blob: 38cfc379245d37be3edaa6353325cb01976fca0d [file] [log] [blame]
Matus Fabian229c1aa2018-05-28 04:09:52 -07001/*
2 * Copyright (c) 2018 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15/**
16 * @brief The NAT inline functions
17 */
18
19#ifndef __included_nat_inlines_h__
20#define __included_nat_inlines_h__
21
Matus Fabianab395ec2018-09-20 23:18:41 -070022#include <vnet/fib/ip4_fib.h>
Matus Fabian229c1aa2018-05-28 04:09:52 -070023#include <nat/nat.h>
24
25always_inline u32
26ip_proto_to_snat_proto (u8 ip_proto)
27{
28 u32 snat_proto = ~0;
29
30 snat_proto = (ip_proto == IP_PROTOCOL_UDP) ? SNAT_PROTOCOL_UDP : snat_proto;
31 snat_proto = (ip_proto == IP_PROTOCOL_TCP) ? SNAT_PROTOCOL_TCP : snat_proto;
32 snat_proto =
33 (ip_proto == IP_PROTOCOL_ICMP) ? SNAT_PROTOCOL_ICMP : snat_proto;
34 snat_proto =
35 (ip_proto == IP_PROTOCOL_ICMP6) ? SNAT_PROTOCOL_ICMP : snat_proto;
36
37 return snat_proto;
38}
39
40always_inline u8
41snat_proto_to_ip_proto (snat_protocol_t snat_proto)
42{
43 u8 ip_proto = ~0;
44
45 ip_proto = (snat_proto == SNAT_PROTOCOL_UDP) ? IP_PROTOCOL_UDP : ip_proto;
46 ip_proto = (snat_proto == SNAT_PROTOCOL_TCP) ? IP_PROTOCOL_TCP : ip_proto;
47 ip_proto = (snat_proto == SNAT_PROTOCOL_ICMP) ? IP_PROTOCOL_ICMP : ip_proto;
48
49 return ip_proto;
50}
51
52static_always_inline u8
53icmp_is_error_message (icmp46_header_t * icmp)
54{
55 switch (icmp->type)
56 {
57 case ICMP4_destination_unreachable:
58 case ICMP4_time_exceeded:
59 case ICMP4_parameter_problem:
60 case ICMP4_source_quench:
61 case ICMP4_redirect:
62 case ICMP4_alternate_host_address:
63 return 1;
64 }
65 return 0;
66}
67
68always_inline u8
69is_interface_addr (snat_main_t * sm, vlib_node_runtime_t * node,
70 u32 sw_if_index0, u32 ip4_addr)
71{
72 snat_runtime_t *rt = (snat_runtime_t *) node->runtime_data;
73 ip4_address_t *first_int_addr;
74
75 if (PREDICT_FALSE (rt->cached_sw_if_index != sw_if_index0))
76 {
77 first_int_addr =
78 ip4_interface_first_address (sm->ip4_main, sw_if_index0,
79 0 /* just want the address */ );
80 rt->cached_sw_if_index = sw_if_index0;
81 if (first_int_addr)
82 rt->cached_ip4_address = first_int_addr->as_u32;
83 else
84 rt->cached_ip4_address = 0;
85 }
86
87 if (PREDICT_FALSE (ip4_addr == rt->cached_ip4_address))
88 return 1;
89 else
90 return 0;
91}
92
93always_inline u8
94maximum_sessions_exceeded (snat_main_t * sm, u32 thread_index)
95{
96 if (pool_elts (sm->per_thread_data[thread_index].sessions) >=
97 sm->max_translations)
98 return 1;
99
100 return 0;
101}
102
103always_inline void
104nat_send_all_to_node (vlib_main_t * vm, u32 * bi_vector,
105 vlib_node_runtime_t * node, vlib_error_t * error,
106 u32 next)
107{
108 u32 n_left_from, *from, next_index, *to_next, n_left_to_next;
109
110 from = bi_vector;
111 n_left_from = vec_len (bi_vector);
112 next_index = node->cached_next_index;
113 while (n_left_from > 0)
114 {
115 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
116 while (n_left_from > 0 && n_left_to_next > 0)
117 {
118 u32 bi0 = to_next[0] = from[0];
119 from += 1;
120 n_left_from -= 1;
121 to_next += 1;
122 n_left_to_next -= 1;
123 vlib_buffer_t *p0 = vlib_get_buffer (vm, bi0);
Juraj Slobodafe0aa762018-07-23 12:22:54 +0200124 if (error)
125 p0->error = *error;
Matus Fabian229c1aa2018-05-28 04:09:52 -0700126 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
127 n_left_to_next, bi0, next);
128 }
129 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
130 }
131}
132
133always_inline void
134user_session_increment (snat_main_t * sm, snat_user_t * u, u8 is_static)
135{
136 if (u->nsessions + u->nstaticsessions < sm->max_translations_per_user)
137 {
138 if (is_static)
139 u->nstaticsessions++;
140 else
141 u->nsessions++;
142 }
143}
144
145always_inline void
Matus Fabian68ba8802018-08-08 05:52:47 -0700146nat44_delete_user_with_no_session (snat_main_t * sm, snat_user_t * u,
147 u32 thread_index)
148{
149 clib_bihash_kv_8_8_t kv;
150 snat_user_key_t u_key;
151 snat_main_per_thread_data_t *tsm = vec_elt_at_index (sm->per_thread_data,
152 thread_index);
153
154 if (u->nstaticsessions == 0 && u->nsessions == 0)
155 {
156 u_key.addr.as_u32 = u->addr.as_u32;
157 u_key.fib_index = u->fib_index;
158 kv.key = u_key.as_u64;
159 pool_put_index (tsm->list_pool, u->sessions_per_user_list_head_index);
160 pool_put (tsm->users, u);
161 clib_bihash_add_del_8_8 (&tsm->user_hash, &kv, 0);
162 }
163}
164
165always_inline void
Matus Fabian229c1aa2018-05-28 04:09:52 -0700166nat44_delete_session (snat_main_t * sm, snat_session_t * ses,
167 u32 thread_index)
168{
169 snat_main_per_thread_data_t *tsm = vec_elt_at_index (sm->per_thread_data,
170 thread_index);
171 clib_bihash_kv_8_8_t kv, value;
172 snat_user_key_t u_key;
173 snat_user_t *u;
174
175 nat_log_debug ("session deleted %U", format_snat_session, tsm, ses);
Matus Fabian68ba8802018-08-08 05:52:47 -0700176
177 clib_dlist_remove (tsm->list_pool, ses->per_user_index);
178 pool_put_index (tsm->list_pool, ses->per_user_index);
179 pool_put (tsm->sessions, ses);
180
Matus Fabian229c1aa2018-05-28 04:09:52 -0700181 u_key.addr = ses->in2out.addr;
182 u_key.fib_index = ses->in2out.fib_index;
183 kv.key = u_key.as_u64;
184 if (!clib_bihash_search_8_8 (&tsm->user_hash, &kv, &value))
185 {
186 u = pool_elt_at_index (tsm->users, value.value);
187 if (snat_is_session_static (ses))
188 u->nstaticsessions--;
189 else
190 u->nsessions--;
Matus Fabian68ba8802018-08-08 05:52:47 -0700191
192 nat44_delete_user_with_no_session (sm, u, thread_index);
Matus Fabian229c1aa2018-05-28 04:09:52 -0700193 }
Matus Fabian229c1aa2018-05-28 04:09:52 -0700194}
195
196/** \brief Set TCP session state.
197 @return 1 if session was closed, otherwise 0
198*/
199always_inline int
200nat44_set_tcp_session_state_i2o (snat_main_t * sm, snat_session_t * ses,
201 tcp_header_t * tcp, u32 thread_index)
202{
Matus Fabian15e8e682018-11-21 04:53:10 -0800203 if ((ses->state == 0) && (tcp->flags & TCP_FLAG_RST))
204 ses->state = NAT44_SES_RST;
205 if ((ses->state == NAT44_SES_RST) && !(tcp->flags & TCP_FLAG_RST))
206 ses->state = 0;
Matus Fabian878c6462018-08-23 00:33:35 -0700207 if ((tcp->flags & TCP_FLAG_ACK) && (ses->state & NAT44_SES_I2O_SYN) &&
208 (ses->state & NAT44_SES_O2I_SYN))
209 ses->state = 0;
210 if (tcp->flags & TCP_FLAG_SYN)
211 ses->state |= NAT44_SES_I2O_SYN;
Matus Fabian229c1aa2018-05-28 04:09:52 -0700212 if (tcp->flags & TCP_FLAG_FIN)
213 {
214 ses->i2o_fin_seq = clib_net_to_host_u32 (tcp->seq_number);
215 ses->state |= NAT44_SES_I2O_FIN;
216 }
217 if ((tcp->flags & TCP_FLAG_ACK) && (ses->state & NAT44_SES_O2I_FIN))
218 {
219 if (clib_net_to_host_u32 (tcp->ack_number) > ses->o2i_fin_seq)
220 ses->state |= NAT44_SES_O2I_FIN_ACK;
221 }
Matus Fabian6c01dce2018-11-16 04:41:31 -0800222 if (nat44_is_ses_closed (ses)
223 && !(ses->flags & SNAT_SESSION_FLAG_OUTPUT_FEATURE))
Matus Fabian229c1aa2018-05-28 04:09:52 -0700224 {
225 nat_log_debug ("TCP close connection %U", format_snat_session,
226 &sm->per_thread_data[thread_index], ses);
227 nat_free_session_data (sm, ses, thread_index);
228 nat44_delete_session (sm, ses, thread_index);
229 return 1;
230 }
231 return 0;
232}
233
234always_inline int
235nat44_set_tcp_session_state_o2i (snat_main_t * sm, snat_session_t * ses,
236 tcp_header_t * tcp, u32 thread_index)
237{
Matus Fabian15e8e682018-11-21 04:53:10 -0800238 if ((ses->state == 0) && (tcp->flags & TCP_FLAG_RST))
239 ses->state = NAT44_SES_RST;
240 if ((ses->state == NAT44_SES_RST) && !(tcp->flags & TCP_FLAG_RST))
241 ses->state = 0;
Matus Fabian878c6462018-08-23 00:33:35 -0700242 if ((tcp->flags & TCP_FLAG_ACK) && (ses->state & NAT44_SES_I2O_SYN) &&
243 (ses->state & NAT44_SES_O2I_SYN))
244 ses->state = 0;
245 if (tcp->flags & TCP_FLAG_SYN)
246 ses->state |= NAT44_SES_O2I_SYN;
Matus Fabian229c1aa2018-05-28 04:09:52 -0700247 if (tcp->flags & TCP_FLAG_FIN)
248 {
249 ses->o2i_fin_seq = clib_net_to_host_u32 (tcp->seq_number);
250 ses->state |= NAT44_SES_O2I_FIN;
251 }
252 if ((tcp->flags & TCP_FLAG_ACK) && (ses->state & NAT44_SES_I2O_FIN))
253 {
254 if (clib_net_to_host_u32 (tcp->ack_number) > ses->i2o_fin_seq)
255 ses->state |= NAT44_SES_I2O_FIN_ACK;
256 }
257 if (nat44_is_ses_closed (ses))
258 {
259 nat_log_debug ("TCP close connection %U", format_snat_session,
260 &sm->per_thread_data[thread_index], ses);
261 nat_free_session_data (sm, ses, thread_index);
262 nat44_delete_session (sm, ses, thread_index);
263 return 1;
264 }
265 return 0;
266}
267
Matus Fabian878c6462018-08-23 00:33:35 -0700268always_inline u32
269nat44_session_get_timeout (snat_main_t * sm, snat_session_t * s)
270{
271 switch (s->in2out.protocol)
272 {
273 case SNAT_PROTOCOL_ICMP:
274 return sm->icmp_timeout;
275 case SNAT_PROTOCOL_UDP:
276 return sm->udp_timeout;
277 case SNAT_PROTOCOL_TCP:
278 {
279 if (s->state)
280 return sm->tcp_transitory_timeout;
281 else
282 return sm->tcp_established_timeout;
283 }
284 default:
285 return sm->udp_timeout;
286 }
287
288 return 0;
289}
290
Matus Fabian229c1aa2018-05-28 04:09:52 -0700291always_inline void
292nat44_session_update_counters (snat_session_t * s, f64 now, uword bytes)
293{
294 s->last_heard = now;
295 s->total_pkts++;
296 s->total_bytes += bytes;
297}
298
299/** \brief Per-user LRU list maintenance */
300always_inline void
301nat44_session_update_lru (snat_main_t * sm, snat_session_t * s,
302 u32 thread_index)
303{
304 clib_dlist_remove (sm->per_thread_data[thread_index].list_pool,
305 s->per_user_index);
306 clib_dlist_addtail (sm->per_thread_data[thread_index].list_pool,
307 s->per_user_list_head_index, s->per_user_index);
308}
309
Matus Fabiana6110b62018-06-13 05:39:07 -0700310always_inline void
311make_ed_kv (clib_bihash_kv_16_8_t * kv, ip4_address_t * l_addr,
312 ip4_address_t * r_addr, u8 proto, u32 fib_index, u16 l_port,
313 u16 r_port)
314{
315 nat_ed_ses_key_t *key = (nat_ed_ses_key_t *) kv->key;
316
317 key->l_addr.as_u32 = l_addr->as_u32;
318 key->r_addr.as_u32 = r_addr->as_u32;
319 key->fib_index = fib_index;
320 key->proto = proto;
321 key->l_port = l_port;
322 key->r_port = r_port;
323
324 kv->value = ~0ULL;
325}
326
327always_inline void
328make_sm_kv (clib_bihash_kv_8_8_t * kv, ip4_address_t * addr, u8 proto,
329 u32 fib_index, u16 port)
330{
331 snat_session_key_t key;
332
333 key.addr.as_u32 = addr->as_u32;
334 key.port = port;
335 key.protocol = proto;
336 key.fib_index = fib_index;
337
338 kv->key = key.as_u64;
339 kv->value = ~0ULL;
340}
341
Matus Fabianbb4e0222018-09-13 02:36:25 -0700342always_inline void
343mss_clamping (snat_main_t * sm, tcp_header_t * tcp, ip_csum_t * sum)
344{
345 u8 *data;
346 u8 opt_len, opts_len, kind;
347 u16 mss;
348
349 if (!(sm->mss_clamping && tcp_syn (tcp)))
350 return;
351
352 opts_len = (tcp_doff (tcp) << 2) - sizeof (tcp_header_t);
353 data = (u8 *) (tcp + 1);
354 for (; opts_len > 0; opts_len -= opt_len, data += opt_len)
355 {
356 kind = data[0];
357
358 if (kind == TCP_OPTION_EOL)
359 break;
360 else if (kind == TCP_OPTION_NOOP)
361 {
362 opt_len = 1;
363 continue;
364 }
365 else
366 {
367 if (opts_len < 2)
368 return;
369 opt_len = data[1];
370
371 if (opt_len < 2 || opt_len > opts_len)
372 return;
373 }
374
375 if (kind == TCP_OPTION_MSS)
376 {
377 mss = *(u16 *) (data + 2);
378 if (clib_net_to_host_u16 (mss) > sm->mss_clamping)
379 {
380 *sum =
381 ip_csum_update (*sum, mss, sm->mss_value_net, ip4_header_t,
382 length);
Dave Barach178cf492018-11-13 16:34:13 -0500383 clib_memcpy_fast (data + 2, &sm->mss_value_net, 2);
Matus Fabianbb4e0222018-09-13 02:36:25 -0700384 }
385 return;
386 }
387 }
388}
389
Matus Fabianab395ec2018-09-20 23:18:41 -0700390/**
391 * @brief Check if packet should be translated
392 *
393 * Packets aimed at outside interface and external address with active session
394 * should be translated.
395 *
396 * @param sm NAT main
397 * @param rt NAT runtime data
398 * @param sw_if_index0 index of the inside interface
399 * @param ip0 IPv4 header
400 * @param proto0 NAT protocol
401 * @param rx_fib_index0 RX FIB index
402 *
403 * @returns 0 if packet should be translated otherwise 1
404 */
405static inline int
406snat_not_translate_fast (snat_main_t * sm, vlib_node_runtime_t * node,
407 u32 sw_if_index0, ip4_header_t * ip0, u32 proto0,
408 u32 rx_fib_index0)
409{
410 if (sm->out2in_dpo)
411 return 0;
412
413 fib_node_index_t fei = FIB_NODE_INDEX_INVALID;
414 nat_outside_fib_t *outside_fib;
415 fib_prefix_t pfx = {
416 .fp_proto = FIB_PROTOCOL_IP4,
417 .fp_len = 32,
418 .fp_addr = {
419 .ip4.as_u32 = ip0->dst_address.as_u32,
420 }
421 ,
422 };
423
424 /* Don't NAT packet aimed at the intfc address */
425 if (PREDICT_FALSE (is_interface_addr (sm, node, sw_if_index0,
426 ip0->dst_address.as_u32)))
427 return 1;
428
429 fei = fib_table_lookup (rx_fib_index0, &pfx);
430 if (FIB_NODE_INDEX_INVALID != fei)
431 {
432 u32 sw_if_index = fib_entry_get_resolving_interface (fei);
433 if (sw_if_index == ~0)
434 {
435 vec_foreach (outside_fib, sm->outside_fibs)
436 {
437 fei = fib_table_lookup (outside_fib->fib_index, &pfx);
438 if (FIB_NODE_INDEX_INVALID != fei)
439 {
440 sw_if_index = fib_entry_get_resolving_interface (fei);
441 if (sw_if_index != ~0)
442 break;
443 }
444 }
445 }
446 if (sw_if_index == ~0)
447 return 1;
448
449 snat_interface_t *i;
450 pool_foreach (i, sm->interfaces, (
451 {
452 /* NAT packet aimed at outside interface */
453 if ((nat_interface_is_outside (i))
454 && (sw_if_index ==
455 i->sw_if_index)) return 0;}
456 ));
457 }
458
459 return 1;
460}
461
Matus Fabian229c1aa2018-05-28 04:09:52 -0700462#endif /* __included_nat_inlines_h__ */
463
464/*
465 * fd.io coding-style-patch-verification: ON
466 *
467 * Local Variables:
468 * eval: (c-set-style "gnu")
469 * End:
470 */