FD.io VPP  v19.04-6-g6f05f72
Vector Packet Processing
nat44_hairpinning.c
Go to the documentation of this file.
1 /*
2  * Copyright (c) 2018 Cisco and/or its affiliates.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at:
6  *
7  * http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 /**
16  * @file
17  * @brief NAT44 hairpinning
18  */
19 
20 #include <vlib/vlib.h>
21 #include <vnet/vnet.h>
22 #include <vnet/fib/ip4_fib.h>
23 #include <nat/nat.h>
24 #include <nat/nat_inlines.h>
25 #include <nat/nat_reass.h>
26 
27 typedef enum
28 {
35 
36 typedef enum
37 {
42 
43 #define foreach_nat44_hairpin_error \
44 _(PROCESSED, "NAT44 hairpinning packets processed")
45 
46 typedef enum
47 {
48 #define _(sym,str) NAT44_HAIRPIN_ERROR_##sym,
50 #undef _
53 
54 static char *nat44_hairpin_error_strings[] = {
55 #define _(sym,string) string,
57 #undef _
58 };
59 
61 
64 {
65  snat_address_t *ap;
66  clib_bihash_kv_8_8_t kv, value;
67  snat_session_key_t m_key;
68 
69  /* *INDENT-OFF* */
70  vec_foreach (ap, sm->addresses)
71  {
72  if (ap->addr.as_u32 == dst_addr->as_u32)
73  return 1;
74  }
75  /* *INDENT-ON* */
76 
77  m_key.addr.as_u32 = dst_addr->as_u32;
78  m_key.fib_index = 0;
79  m_key.port = 0;
80  m_key.protocol = 0;
81  kv.key = m_key.as_u64;
82  if (!clib_bihash_search_8_8 (&sm->static_mapping_by_external, &kv, &value))
83  return 1;
84 
85  return 0;
86 }
87 
88 #ifndef CLIB_MARCH_VARIANT
89 int
91  vlib_buffer_t * b0,
92  ip4_header_t * ip0,
93  udp_header_t * udp0,
94  tcp_header_t * tcp0, u32 proto0, int is_ed)
95 {
96  snat_session_key_t key0, sm0;
97  snat_session_t *s0;
98  clib_bihash_kv_8_8_t kv0, value0;
99  ip_csum_t sum0;
100  u32 new_dst_addr0 = 0, old_dst_addr0, ti = 0, si;
101  u16 new_dst_port0, old_dst_port0;
102  int rv;
103 
104  key0.addr = ip0->dst_address;
105  key0.port = udp0->dst_port;
106  key0.protocol = proto0;
107  key0.fib_index = sm->outside_fib_index;
108  kv0.key = key0.as_u64;
109 
110  /* Check if destination is static mappings */
111  if (!snat_static_mapping_match (sm, key0, &sm0, 1, 0, 0, 0, 0, 0))
112  {
113  new_dst_addr0 = sm0.addr.as_u32;
114  new_dst_port0 = sm0.port;
115  vnet_buffer (b0)->sw_if_index[VLIB_TX] = sm0.fib_index;
116  }
117  /* or active session */
118  else
119  {
120  if (sm->num_workers > 1)
121  ti =
122  (clib_net_to_host_u16 (udp0->dst_port) -
123  1024) / sm->port_per_thread;
124  else
125  ti = sm->num_workers;
126 
127  if (is_ed)
128  {
129  clib_bihash_kv_16_8_t ed_kv, ed_value;
130  make_ed_kv (&ed_kv, &ip0->dst_address, &ip0->src_address,
131  ip0->protocol, sm->outside_fib_index, udp0->dst_port,
132  udp0->src_port);
133  rv = clib_bihash_search_16_8 (&sm->per_thread_data[ti].out2in_ed,
134  &ed_kv, &ed_value);
135  si = ed_value.value;
136  }
137  else
138  {
139  rv = clib_bihash_search_8_8 (&sm->per_thread_data[ti].out2in, &kv0,
140  &value0);
141  si = value0.value;
142  }
143  if (rv)
144  return 0;
145 
146  s0 = pool_elt_at_index (sm->per_thread_data[ti].sessions, si);
147  new_dst_addr0 = s0->in2out.addr.as_u32;
148  new_dst_port0 = s0->in2out.port;
149  vnet_buffer (b0)->sw_if_index[VLIB_TX] = s0->in2out.fib_index;
150  }
151 
152  /* Destination is behind the same NAT, use internal address and port */
153  if (new_dst_addr0)
154  {
155  old_dst_addr0 = ip0->dst_address.as_u32;
156  ip0->dst_address.as_u32 = new_dst_addr0;
157  sum0 = ip0->checksum;
158  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
159  ip4_header_t, dst_address);
160  ip0->checksum = ip_csum_fold (sum0);
161 
162  old_dst_port0 = tcp0->dst;
163  if (PREDICT_TRUE (new_dst_port0 != old_dst_port0))
164  {
165  if (PREDICT_TRUE (proto0 == SNAT_PROTOCOL_TCP))
166  {
167  tcp0->dst = new_dst_port0;
168  sum0 = tcp0->checksum;
169  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
170  ip4_header_t, dst_address);
171  sum0 = ip_csum_update (sum0, old_dst_port0, new_dst_port0,
172  ip4_header_t /* cheat */ , length);
173  tcp0->checksum = ip_csum_fold (sum0);
174  }
175  else
176  {
177  udp0->dst_port = new_dst_port0;
178  udp0->checksum = 0;
179  }
180  }
181  else
182  {
183  if (PREDICT_TRUE (proto0 == SNAT_PROTOCOL_TCP))
184  {
185  sum0 = tcp0->checksum;
186  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
187  ip4_header_t, dst_address);
188  tcp0->checksum = ip_csum_fold (sum0);
189  }
190  }
191  return 1;
192  }
193  return 0;
194 }
195 #endif
196 
197 #ifndef CLIB_MARCH_VARIANT
198 u32
200  vlib_buffer_t * b0,
201  ip4_header_t * ip0, icmp46_header_t * icmp0, int is_ed)
202 {
203  snat_session_key_t key0;
204  clib_bihash_kv_8_8_t kv0, value0;
205  u32 old_dst_addr0, new_dst_addr0;
206  u32 old_addr0, new_addr0;
207  u16 old_port0, new_port0;
208  u16 old_checksum0, new_checksum0;
209  u32 si, ti = 0;
210  ip_csum_t sum0;
211  snat_session_t *s0;
213 
214  if (icmp_is_error_message (icmp0))
215  {
216  ip4_header_t *inner_ip0 = 0;
217  tcp_udp_header_t *l4_header = 0;
218 
219  inner_ip0 = (ip4_header_t *) ((icmp_echo_header_t *) (icmp0 + 1) + 1);
220  l4_header = ip4_next_header (inner_ip0);
222 
223  if (protocol != SNAT_PROTOCOL_TCP && protocol != SNAT_PROTOCOL_UDP)
224  return 1;
225 
226  if (is_ed)
227  {
228  clib_bihash_kv_16_8_t ed_kv, ed_value;
229  make_ed_kv (&ed_kv, &ip0->dst_address, &ip0->src_address,
230  inner_ip0->protocol, sm->outside_fib_index,
231  l4_header->src_port, l4_header->dst_port);
232  if (clib_bihash_search_16_8 (&sm->per_thread_data[ti].out2in_ed,
233  &ed_kv, &ed_value))
234  return 1;
235  si = ed_value.value;
236  }
237  else
238  {
239  key0.addr = ip0->dst_address;
240  key0.port = l4_header->src_port;
241  key0.protocol = protocol;
242  key0.fib_index = sm->outside_fib_index;
243  kv0.key = key0.as_u64;
244  if (clib_bihash_search_8_8 (&sm->per_thread_data[ti].out2in, &kv0,
245  &value0))
246  return 1;
247  si = value0.value;
248  }
249  s0 = pool_elt_at_index (sm->per_thread_data[ti].sessions, si);
250  new_dst_addr0 = s0->in2out.addr.as_u32;
251  vnet_buffer (b0)->sw_if_index[VLIB_TX] = s0->in2out.fib_index;
252 
253  /* update inner source IP address */
254  old_addr0 = inner_ip0->src_address.as_u32;
255  inner_ip0->src_address.as_u32 = new_dst_addr0;
256  new_addr0 = inner_ip0->src_address.as_u32;
257  sum0 = icmp0->checksum;
258  sum0 = ip_csum_update (sum0, old_addr0, new_addr0, ip4_header_t,
259  src_address);
260  icmp0->checksum = ip_csum_fold (sum0);
261 
262  /* update inner IP header checksum */
263  old_checksum0 = inner_ip0->checksum;
264  sum0 = inner_ip0->checksum;
265  sum0 = ip_csum_update (sum0, old_addr0, new_addr0, ip4_header_t,
266  src_address);
267  inner_ip0->checksum = ip_csum_fold (sum0);
268  new_checksum0 = inner_ip0->checksum;
269  sum0 = icmp0->checksum;
270  sum0 = ip_csum_update (sum0, old_checksum0, new_checksum0, ip4_header_t,
271  checksum);
272  icmp0->checksum = ip_csum_fold (sum0);
273 
274  /* update inner source port */
275  old_port0 = l4_header->src_port;
276  l4_header->src_port = s0->in2out.port;
277  new_port0 = l4_header->src_port;
278  sum0 = icmp0->checksum;
279  sum0 = ip_csum_update (sum0, old_port0, new_port0, tcp_udp_header_t,
280  src_port);
281  icmp0->checksum = ip_csum_fold (sum0);
282  }
283  else
284  {
285  key0.addr = ip0->dst_address;
286  key0.port = 0;
287  key0.protocol = 0;
288  key0.fib_index = sm->outside_fib_index;
289  kv0.key = key0.as_u64;
290 
291  if (clib_bihash_search_8_8
292  (&sm->static_mapping_by_external, &kv0, &value0))
293  {
294  if (!is_ed)
295  {
296  icmp_echo_header_t *echo0 = (icmp_echo_header_t *) (icmp0 + 1);
297  u16 icmp_id0 = echo0->identifier;
298  key0.addr = ip0->dst_address;
299  key0.port = icmp_id0;
300  key0.protocol = SNAT_PROTOCOL_ICMP;
301  key0.fib_index = sm->outside_fib_index;
302  kv0.key = key0.as_u64;
303  if (sm->num_workers > 1)
304  ti =
305  (clib_net_to_host_u16 (icmp_id0) -
306  1024) / sm->port_per_thread;
307  else
308  ti = sm->num_workers;
309  int rv =
310  clib_bihash_search_8_8 (&sm->per_thread_data[ti].out2in, &kv0,
311  &value0);
312  if (!rv)
313  {
314  si = value0.value;
315  s0 =
317  new_dst_addr0 = s0->in2out.addr.as_u32;
318  vnet_buffer (b0)->sw_if_index[VLIB_TX] =
319  s0->in2out.fib_index;
320  echo0->identifier = s0->in2out.port;
321  sum0 = icmp0->checksum;
322  sum0 = ip_csum_update (sum0, icmp_id0, s0->in2out.port,
323  icmp_echo_header_t, identifier);
324  icmp0->checksum = ip_csum_fold (sum0);
325  goto change_addr;
326  }
327  }
328 
329  return 1;
330  }
331 
332  m0 = pool_elt_at_index (sm->static_mappings, value0.value);
333 
334  new_dst_addr0 = m0->local_addr.as_u32;
335  if (vnet_buffer (b0)->sw_if_index[VLIB_TX] == ~0)
336  vnet_buffer (b0)->sw_if_index[VLIB_TX] = m0->fib_index;
337  }
338 change_addr:
339  /* Destination is behind the same NAT, use internal address and port */
340  if (new_dst_addr0)
341  {
342  old_dst_addr0 = ip0->dst_address.as_u32;
343  ip0->dst_address.as_u32 = new_dst_addr0;
344  sum0 = ip0->checksum;
345  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
346  ip4_header_t, dst_address);
347  ip0->checksum = ip_csum_fold (sum0);
348  }
349  return 0;
350 }
351 #endif
352 
353 #ifndef CLIB_MARCH_VARIANT
354 void
356  vlib_buffer_t * b, ip4_header_t * ip)
357 {
358  clib_bihash_kv_8_8_t kv, value;
360  u32 old_addr, new_addr;
361  ip_csum_t sum;
362 
363  make_sm_kv (&kv, &ip->dst_address, 0, 0, 0);
364  if (clib_bihash_search_8_8 (&sm->static_mapping_by_external, &kv, &value))
365  return;
366 
367  m = pool_elt_at_index (sm->static_mappings, value.value);
368 
369  old_addr = ip->dst_address.as_u32;
370  new_addr = ip->dst_address.as_u32 = m->local_addr.as_u32;
371  sum = ip->checksum;
372  sum = ip_csum_update (sum, old_addr, new_addr, ip4_header_t, dst_address);
373  ip->checksum = ip_csum_fold (sum);
374 
375  if (vnet_buffer (b)->sw_if_index[VLIB_TX] == ~0)
376  vnet_buffer (b)->sw_if_index[VLIB_TX] = m->fib_index;
377 }
378 #endif
379 
380 #ifndef CLIB_MARCH_VARIANT
381 void
383  vlib_buffer_t * b, ip4_header_t * ip)
384 {
385  u32 old_addr, new_addr = 0, ti = 0;
386  clib_bihash_kv_8_8_t kv, value;
387  clib_bihash_kv_16_8_t s_kv, s_value;
389  ip_csum_t sum;
390  snat_session_t *s;
392 
393  if (sm->num_workers > 1)
394  ti = sm->worker_out2in_cb (ip, sm->outside_fib_index);
395  else
396  ti = sm->num_workers;
397  tsm = &sm->per_thread_data[ti];
398 
399  old_addr = ip->dst_address.as_u32;
400  make_ed_kv (&s_kv, &ip->dst_address, &ip->src_address, ip->protocol,
401  sm->outside_fib_index, 0, 0);
402  if (clib_bihash_search_16_8 (&tsm->out2in_ed, &s_kv, &s_value))
403  {
404  make_sm_kv (&kv, &ip->dst_address, 0, 0, 0);
405  if (clib_bihash_search_8_8
406  (&sm->static_mapping_by_external, &kv, &value))
407  return;
408 
409  m = pool_elt_at_index (sm->static_mappings, value.value);
410  if (vnet_buffer (b)->sw_if_index[VLIB_TX] == ~0)
411  vnet_buffer (b)->sw_if_index[VLIB_TX] = m->fib_index;
412  new_addr = ip->dst_address.as_u32 = m->local_addr.as_u32;
413  }
414  else
415  {
416  s = pool_elt_at_index (sm->per_thread_data[ti].sessions, s_value.value);
417  if (vnet_buffer (b)->sw_if_index[VLIB_TX] == ~0)
418  vnet_buffer (b)->sw_if_index[VLIB_TX] = s->in2out.fib_index;
419  new_addr = ip->dst_address.as_u32 = s->in2out.addr.as_u32;
420  }
421  sum = ip->checksum;
422  sum = ip_csum_update (sum, old_addr, new_addr, ip4_header_t, dst_address);
423  ip->checksum = ip_csum_fold (sum);
424 }
425 #endif
426 
427 #ifndef CLIB_MARCH_VARIANT
428 void
430  vlib_buffer_t * b0,
431  ip4_header_t * ip0,
432  u16 sport, u16 dport, u32 proto0, int is_ed)
433 {
434  snat_session_key_t key0, sm0;
435  snat_session_t *s0;
436  clib_bihash_kv_8_8_t kv0, value0;
437  ip_csum_t sum0;
438  u32 new_dst_addr0 = 0, old_dst_addr0, ti = 0, si;
439  u16 new_dst_port0, old_dst_port0;
440  udp_header_t *udp0;
441  tcp_header_t *tcp0;
442  int rv;
443 
444  key0.addr = ip0->dst_address;
445  key0.port = dport;
446  key0.protocol = proto0;
447  key0.fib_index = sm->outside_fib_index;
448  kv0.key = key0.as_u64;
449 
450  udp0 = ip4_next_header (ip0);
451 
452  /* Check if destination is static mappings */
453  if (!snat_static_mapping_match (sm, key0, &sm0, 1, 0, 0, 0, 0, 0))
454  {
455  new_dst_addr0 = sm0.addr.as_u32;
456  new_dst_port0 = sm0.port;
457  vnet_buffer (b0)->sw_if_index[VLIB_TX] = sm0.fib_index;
458  }
459  /* or active sessions */
460  else
461  {
462  if (sm->num_workers > 1)
463  ti =
464  (clib_net_to_host_u16 (udp0->dst_port) -
465  1024) / sm->port_per_thread;
466  else
467  ti = sm->num_workers;
468 
469  if (is_ed)
470  {
471  clib_bihash_kv_16_8_t ed_kv, ed_value;
472  make_ed_kv (&ed_kv, &ip0->dst_address, &ip0->src_address,
473  ip0->protocol, sm->outside_fib_index, udp0->dst_port,
474  udp0->src_port);
475  rv = clib_bihash_search_16_8 (&sm->per_thread_data[ti].out2in_ed,
476  &ed_kv, &ed_value);
477  si = ed_value.value;
478  }
479  else
480  {
481  rv = clib_bihash_search_8_8 (&sm->per_thread_data[ti].out2in, &kv0,
482  &value0);
483  si = value0.value;
484  }
485  if (!rv)
486  {
487  s0 = pool_elt_at_index (sm->per_thread_data[ti].sessions, si);
488  new_dst_addr0 = s0->in2out.addr.as_u32;
489  new_dst_port0 = s0->in2out.port;
490  vnet_buffer (b0)->sw_if_index[VLIB_TX] = s0->in2out.fib_index;
491  }
492  }
493 
494  /* Destination is behind the same NAT, use internal address and port */
495  if (new_dst_addr0)
496  {
497  old_dst_addr0 = ip0->dst_address.as_u32;
498  ip0->dst_address.as_u32 = new_dst_addr0;
499  sum0 = ip0->checksum;
500  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
501  ip4_header_t, dst_address);
502  ip0->checksum = ip_csum_fold (sum0);
503 
504  old_dst_port0 = dport;
505  if (PREDICT_TRUE (new_dst_port0 != old_dst_port0 &&
506  ip4_is_first_fragment (ip0)))
507  {
508  if (PREDICT_TRUE (proto0 == SNAT_PROTOCOL_TCP))
509  {
510  tcp0 = ip4_next_header (ip0);
511  tcp0->dst = new_dst_port0;
512  sum0 = tcp0->checksum;
513  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
514  ip4_header_t, dst_address);
515  sum0 = ip_csum_update (sum0, old_dst_port0, new_dst_port0,
516  ip4_header_t /* cheat */ , length);
517  tcp0->checksum = ip_csum_fold (sum0);
518  }
519  else
520  {
521  udp0->dst_port = new_dst_port0;
522  udp0->checksum = 0;
523  }
524  }
525  else
526  {
527  if (PREDICT_TRUE (proto0 == SNAT_PROTOCOL_TCP))
528  {
529  tcp0 = ip4_next_header (ip0);
530  sum0 = tcp0->checksum;
531  sum0 = ip_csum_update (sum0, old_dst_addr0, new_dst_addr0,
532  ip4_header_t, dst_address);
533  tcp0->checksum = ip_csum_fold (sum0);
534  }
535  }
536  }
537 }
538 #endif
539 
540 static inline uword
542  vlib_node_runtime_t * node,
543  vlib_frame_t * frame, int is_ed)
544 {
545  u32 n_left_from, *from, *to_next, stats_node_index;
546  nat_hairpin_next_t next_index;
547  u32 pkts_processed = 0;
548  snat_main_t *sm = &snat_main;
550  u8 arc_index = vnet_feat_arc_ip4_local.feature_arc_index;
551  vnet_feature_config_main_t *cm = &fm->feature_config_mains[arc_index];
552 
553  stats_node_index = is_ed ? sm->ed_hairpinning_node_index :
555  from = vlib_frame_vector_args (frame);
556  n_left_from = frame->n_vectors;
557  next_index = node->cached_next_index;
558 
559  while (n_left_from > 0)
560  {
561  u32 n_left_to_next;
562 
563  vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
564 
565  while (n_left_from > 0 && n_left_to_next > 0)
566  {
567  u32 bi0;
568  vlib_buffer_t *b0;
569  u32 next0;
570  ip4_header_t *ip0;
571  u32 proto0;
572  udp_header_t *udp0;
573  tcp_header_t *tcp0;
574 
575  /* speculatively enqueue b0 to the current next frame */
576  bi0 = from[0];
577  to_next[0] = bi0;
578  from += 1;
579  to_next += 1;
580  n_left_from -= 1;
581  n_left_to_next -= 1;
582 
583  b0 = vlib_get_buffer (vm, bi0);
584  ip0 = vlib_buffer_get_current (b0);
585  udp0 = ip4_next_header (ip0);
586  tcp0 = (tcp_header_t *) udp0;
587 
588  proto0 = ip_proto_to_snat_proto (ip0->protocol);
589 
591  &next0, 0);
592 
593  if (snat_hairpinning (sm, b0, ip0, udp0, tcp0, proto0, is_ed))
594  next0 = NAT_HAIRPIN_NEXT_LOOKUP;
595 
596  pkts_processed += next0 != NAT_HAIRPIN_NEXT_DROP;
597 
598  /* verify speculative enqueue, maybe switch current next frame */
599  vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
600  to_next, n_left_to_next,
601  bi0, next0);
602  }
603 
604  vlib_put_next_frame (vm, node, next_index, n_left_to_next);
605  }
606 
607  vlib_node_increment_counter (vm, stats_node_index,
608  NAT44_HAIRPIN_ERROR_PROCESSED, pkts_processed);
609  return frame->n_vectors;
610 }
611 
613  vlib_node_runtime_t * node,
614  vlib_frame_t * frame)
615 {
616  return nat44_hairpinning_fn_inline (vm, node, frame, 0);
617 }
618 
619 /* *INDENT-OFF* */
621  .name = "nat44-hairpinning",
622  .vector_size = sizeof (u32),
623  .type = VLIB_NODE_TYPE_INTERNAL,
625  .error_strings = nat44_hairpin_error_strings,
626  .n_next_nodes = NAT_HAIRPIN_N_NEXT,
627  .next_nodes = {
628  [NAT_HAIRPIN_NEXT_DROP] = "error-drop",
629  [NAT_HAIRPIN_NEXT_LOOKUP] = "ip4-lookup",
630  },
631 };
632 /* *INDENT-ON* */
633 
635  vlib_node_runtime_t * node,
636  vlib_frame_t * frame)
637 {
638  return nat44_hairpinning_fn_inline (vm, node, frame, 1);
639 }
640 
641 /* *INDENT-OFF* */
643  .name = "nat44-ed-hairpinning",
644  .vector_size = sizeof (u32),
645  .type = VLIB_NODE_TYPE_INTERNAL,
647  .error_strings = nat44_hairpin_error_strings,
648  .n_next_nodes = NAT_HAIRPIN_N_NEXT,
649  .next_nodes = {
650  [NAT_HAIRPIN_NEXT_DROP] = "error-drop",
651  [NAT_HAIRPIN_NEXT_LOOKUP] = "ip4-lookup",
652  },
653 };
654 /* *INDENT-ON* */
655 
656 static inline uword
658  vlib_node_runtime_t * node,
659  vlib_frame_t * frame, int is_ed)
660 {
661  u32 n_left_from, *from, *to_next, stats_node_index;
662  nat_hairpin_next_t next_index;
663  u32 pkts_processed = 0;
664  snat_main_t *sm = &snat_main;
665 
666  stats_node_index = is_ed ? sm->ed_hairpin_dst_node_index :
668 
669  from = vlib_frame_vector_args (frame);
670  n_left_from = frame->n_vectors;
671  next_index = node->cached_next_index;
672 
673  while (n_left_from > 0)
674  {
675  u32 n_left_to_next;
676 
677  vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
678 
679  while (n_left_from > 0 && n_left_to_next > 0)
680  {
681  u32 bi0;
682  vlib_buffer_t *b0;
683  u32 next0;
684  ip4_header_t *ip0;
685  u32 proto0;
686 
687  /* speculatively enqueue b0 to the current next frame */
688  bi0 = from[0];
689  to_next[0] = bi0;
690  from += 1;
691  to_next += 1;
692  n_left_from -= 1;
693  n_left_to_next -= 1;
694 
695  b0 = vlib_get_buffer (vm, bi0);
696  next0 = NAT_HAIRPIN_NEXT_LOOKUP;
697  ip0 = vlib_buffer_get_current (b0);
698 
699  proto0 = ip_proto_to_snat_proto (ip0->protocol);
700 
701  vnet_buffer (b0)->snat.flags = 0;
702  if (PREDICT_FALSE (is_hairpinning (sm, &ip0->dst_address)))
703  {
704  if (proto0 == SNAT_PROTOCOL_TCP || proto0 == SNAT_PROTOCOL_UDP)
705  {
706  udp_header_t *udp0 = ip4_next_header (ip0);
707  tcp_header_t *tcp0 = (tcp_header_t *) udp0;
708 
709  snat_hairpinning (sm, b0, ip0, udp0, tcp0, proto0, is_ed);
710  }
711  else if (proto0 == SNAT_PROTOCOL_ICMP)
712  {
713  icmp46_header_t *icmp0 = ip4_next_header (ip0);
714 
715  snat_icmp_hairpinning (sm, b0, ip0, icmp0, is_ed);
716  }
717  else
718  {
719  if (is_ed)
721  else
722  nat_hairpinning_sm_unknown_proto (sm, b0, ip0);
723  }
724 
725  vnet_buffer (b0)->snat.flags = SNAT_FLAG_HAIRPINNING;
726  }
727 
728  pkts_processed += next0 != NAT_HAIRPIN_NEXT_DROP;
729 
730  /* verify speculative enqueue, maybe switch current next frame */
731  vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
732  to_next, n_left_to_next,
733  bi0, next0);
734  }
735 
736  vlib_put_next_frame (vm, node, next_index, n_left_to_next);
737  }
738 
739  vlib_node_increment_counter (vm, stats_node_index,
740  NAT44_HAIRPIN_ERROR_PROCESSED, pkts_processed);
741  return frame->n_vectors;
742 }
743 
745  vlib_node_runtime_t * node,
746  vlib_frame_t * frame)
747 {
748  return snat_hairpin_dst_fn_inline (vm, node, frame, 0);
749 }
750 
751 /* *INDENT-OFF* */
753  .name = "nat44-hairpin-dst",
754  .vector_size = sizeof (u32),
755  .type = VLIB_NODE_TYPE_INTERNAL,
757  .error_strings = nat44_hairpin_error_strings,
758  .n_next_nodes = NAT_HAIRPIN_N_NEXT,
759  .next_nodes = {
760  [NAT_HAIRPIN_NEXT_DROP] = "error-drop",
761  [NAT_HAIRPIN_NEXT_LOOKUP] = "ip4-lookup",
762  },
763 };
764 /* *INDENT-ON* */
765 
767  vlib_node_runtime_t * node,
768  vlib_frame_t * frame)
769 {
770  return snat_hairpin_dst_fn_inline (vm, node, frame, 1);
771 }
772 
773 /* *INDENT-OFF* */
775  .name = "nat44-ed-hairpin-dst",
776  .vector_size = sizeof (u32),
777  .type = VLIB_NODE_TYPE_INTERNAL,
779  .error_strings = nat44_hairpin_error_strings,
780  .n_next_nodes = NAT_HAIRPIN_N_NEXT,
781  .next_nodes = {
782  [NAT_HAIRPIN_NEXT_DROP] = "error-drop",
783  [NAT_HAIRPIN_NEXT_LOOKUP] = "ip4-lookup",
784  },
785 };
786 /* *INDENT-ON* */
787 
788 static inline uword
790  vlib_node_runtime_t * node,
791  vlib_frame_t * frame, int is_ed)
792 {
793  u32 n_left_from, *from, *to_next, stats_node_index;
794  snat_hairpin_src_next_t next_index;
795  u32 pkts_processed = 0;
796  snat_main_t *sm = &snat_main;
797 
798  stats_node_index = is_ed ? sm->ed_hairpin_src_node_index :
800 
801  from = vlib_frame_vector_args (frame);
802  n_left_from = frame->n_vectors;
803  next_index = node->cached_next_index;
804 
805  while (n_left_from > 0)
806  {
807  u32 n_left_to_next;
808 
809  vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
810 
811  while (n_left_from > 0 && n_left_to_next > 0)
812  {
813  u32 bi0;
814  vlib_buffer_t *b0;
815  u32 next0;
817  u32 sw_if_index0;
818 
819  /* speculatively enqueue b0 to the current next frame */
820  bi0 = from[0];
821  to_next[0] = bi0;
822  from += 1;
823  to_next += 1;
824  n_left_from -= 1;
825  n_left_to_next -= 1;
826 
827  b0 = vlib_get_buffer (vm, bi0);
828  sw_if_index0 = vnet_buffer (b0)->sw_if_index[VLIB_RX];
830 
831  /* *INDENT-OFF* */
833  ({
834  /* Only packets from NAT inside interface */
835  if ((nat_interface_is_inside(i)) && (sw_if_index0 == i->sw_if_index))
836  {
837  if (PREDICT_FALSE ((vnet_buffer (b0)->snat.flags) &
838  SNAT_FLAG_HAIRPINNING))
839  {
840  if (PREDICT_TRUE (sm->num_workers > 1))
841  next0 = SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT_WH;
842  else
843  next0 = SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT;
844  }
845  break;
846  }
847  }));
848  /* *INDENT-ON* */
849 
850  pkts_processed += next0 != SNAT_HAIRPIN_SRC_NEXT_DROP;
851 
852  /* verify speculative enqueue, maybe switch current next frame */
853  vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
854  to_next, n_left_to_next,
855  bi0, next0);
856  }
857 
858  vlib_put_next_frame (vm, node, next_index, n_left_to_next);
859  }
860 
861  vlib_node_increment_counter (vm, stats_node_index,
862  NAT44_HAIRPIN_ERROR_PROCESSED, pkts_processed);
863  return frame->n_vectors;
864 }
865 
867  vlib_node_runtime_t * node,
868  vlib_frame_t * frame)
869 {
870  return snat_hairpin_src_fn_inline (vm, node, frame, 0);
871 }
872 
873 /* *INDENT-OFF* */
875  .name = "nat44-hairpin-src",
876  .vector_size = sizeof (u32),
877  .type = VLIB_NODE_TYPE_INTERNAL,
879  .error_strings = nat44_hairpin_error_strings,
880  .n_next_nodes = SNAT_HAIRPIN_SRC_N_NEXT,
881  .next_nodes = {
882  [SNAT_HAIRPIN_SRC_NEXT_DROP] = "error-drop",
883  [SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT] = "nat44-in2out-output",
884  [SNAT_HAIRPIN_SRC_NEXT_INTERFACE_OUTPUT] = "interface-output",
885  [SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT_WH] = "nat44-in2out-output-worker-handoff",
886  },
887 };
888 /* *INDENT-ON* */
889 
891  vlib_node_runtime_t * node,
892  vlib_frame_t * frame)
893 {
894  return snat_hairpin_src_fn_inline (vm, node, frame, 1);
895 }
896 
897 /* *INDENT-OFF* */
899  .name = "nat44-ed-hairpin-src",
900  .vector_size = sizeof (u32),
901  .type = VLIB_NODE_TYPE_INTERNAL,
903  .error_strings = nat44_hairpin_error_strings,
904  .n_next_nodes = SNAT_HAIRPIN_SRC_N_NEXT,
905  .next_nodes = {
906  [SNAT_HAIRPIN_SRC_NEXT_DROP] = "error-drop",
907  [SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT] = "nat44-ed-in2out-output",
908  [SNAT_HAIRPIN_SRC_NEXT_INTERFACE_OUTPUT] = "interface-output",
909  [SNAT_HAIRPIN_SRC_NEXT_SNAT_IN2OUT_WH] = "nat44-in2out-output-worker-handoff",
910  },
911 };
912 /* *INDENT-ON* */
913 
914 /*
915  * fd.io coding-style-patch-verification: ON
916  *
917  * Local Variables:
918  * eval: (c-set-style "gnu")
919  * End:
920  */
vnet_config_main_t config_main
Definition: feature.h:82
u32 sw_if_index
Definition: ipsec_gre.api:37
u32 hairpin_dst_node_index
Definition: nat.h:521
u32 ed_hairpinning_node_index
Definition: nat.h:523
vlib_node_registration_t snat_hairpin_src_node
(constructor) VLIB_REGISTER_NODE (snat_hairpin_src_node)
ip4_address_t src_address
Definition: ip4_packet.h:170
vlib_node_registration_t nat44_ed_hairpinning_node
(constructor) VLIB_REGISTER_NODE (nat44_ed_hairpinning_node)
#define PREDICT_TRUE(x)
Definition: clib.h:112
vlib_node_registration_t nat44_ed_hairpin_dst_node
(constructor) VLIB_REGISTER_NODE (nat44_ed_hairpin_dst_node)
static_always_inline u8 icmp_is_error_message(icmp46_header_t *icmp)
Definition: nat_inlines.h:54
vlib_node_registration_t nat44_ed_hairpin_src_node
(constructor) VLIB_REGISTER_NODE (nat44_ed_hairpin_src_node)
static void make_sm_kv(clib_bihash_kv_8_8_t *kv, ip4_address_t *addr, u8 proto, u32 fib_index, u16 port)
Definition: nat_inlines.h:338
u16 port_per_thread
Definition: nat.h:445
static char * nat44_hairpin_error_strings[]
int i
uword ip_csum_t
Definition: ip_packet.h:181
#define VLIB_NODE_FN(node)
Definition: node.h:201
struct _tcp_header tcp_header_t
unsigned char u8
Definition: types.h:56
#define fm
u16 src_port
Definition: udp.api:41
#define static_always_inline
Definition: clib.h:99
#define pool_foreach(VAR, POOL, BODY)
Iterate through pool.
Definition: pool.h:493
#define foreach_nat44_hairpin_error
nat44_hairpin_error_t
ip4_address_t dst_address
Definition: ip4_packet.h:170
static void * ip4_next_header(ip4_header_t *i)
Definition: ip4_packet.h:241
unsigned int u32
Definition: types.h:88
ip4_address_t local_addr
Definition: nat.h:331
int snat_static_mapping_match(snat_main_t *sm, snat_session_key_t match, snat_session_key_t *mapping, u8 by_external, u8 *is_addr_only, twice_nat_type_t *twice_nat, lb_nat_type_t *lb, ip4_address_t *ext_host_addr, u8 *is_identity_nat)
Match NAT44 static mapping.
Definition: nat.c:2490
void nat_hairpinning_sm_unknown_proto(snat_main_t *sm, vlib_buffer_t *b, ip4_header_t *ip)
static uword snat_hairpin_dst_fn_inline(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame, int is_ed)
#define pool_elt_at_index(p, i)
Returns pointer to element at given index.
Definition: pool.h:514
nat_hairpin_next_t
clib_bihash_16_8_t out2in_ed
Definition: nat.h:389
u64 key
the key
Definition: bihash_8_8.h:33
unsigned short u16
Definition: types.h:57
u16 protocol
Definition: nat.h:54
snat_static_mapping_t * static_mappings
Definition: nat.h:458
static void * vlib_buffer_get_current(vlib_buffer_t *b)
Get pointer to current data to process.
Definition: buffer.h:229
static void * vnet_get_config_data(vnet_config_main_t *cm, u32 *config_index, u32 *next_index, u32 n_data_bytes)
Definition: config.h:122
#define PREDICT_FALSE(x)
Definition: clib.h:111
u32 hairpin_src_node_index
Definition: nat.h:522
clib_bihash_8_8_t static_mapping_by_external
Definition: nat.h:455
vl_api_address_union_t src_address
Definition: ip_types.api:44
#define vlib_validate_buffer_enqueue_x1(vm, node, next_index, to_next, n_left_to_next, bi0, next0)
Finish enqueueing one buffer forward in the graph.
Definition: buffer_node.h:218
#define vlib_get_next_frame(vm, node, next_index, vectors, n_vectors_left)
Get pointer to next frame vector data by (vlib_node_runtime_t, next_index).
Definition: node_funcs.h:368
static void vlib_node_increment_counter(vlib_main_t *vm, u32 node_index, u32 counter_index, u64 increment)
Definition: node_funcs.h:1180
snat_interface_t * output_feature_interfaces
Definition: nat.h:462
snat_main_t snat_main
Definition: nat.c:39
u16 src_port
Definition: nat.h:1123
u32 ed_hairpin_src_node_index
Definition: nat.h:525
u64 value
the value
Definition: bihash_8_8.h:34
#define VLIB_REGISTER_NODE(x,...)
Definition: node.h:169
u16 n_vectors
Definition: node.h:395
clib_bihash_8_8_t out2in
Definition: nat.h:385
vlib_main_t * vm
Definition: buffer.c:312
vlib_node_registration_t snat_hairpin_dst_node
(constructor) VLIB_REGISTER_NODE (snat_hairpin_dst_node)
u32 outside_fib_index
Definition: nat.h:547
u32 current_config_index
Used by feature subgraph arcs to visit enabled feature nodes.
Definition: buffer.h:147
8 octet key, 8 octet key value pair
Definition: bihash_8_8.h:31
#define ARRAY_LEN(x)
Definition: clib.h:62
ip4_address_t addr
Definition: nat.h:52
void vlib_put_next_frame(vlib_main_t *vm, vlib_node_runtime_t *r, u32 next_index, u32 n_vectors_left)
Release pointer to next frame vector data.
Definition: main.c:465
u32 ed_hairpin_dst_node_index
Definition: nat.h:524
static void make_ed_kv(clib_bihash_kv_16_8_t *kv, ip4_address_t *l_addr, ip4_address_t *r_addr, u8 proto, u32 fib_index, u16 l_port, u16 r_port)
Definition: nat_inlines.h:321
u16 cached_next_index
Next frame index that vector arguments were last enqueued to last time this node ran.
Definition: node.h:514
u32 num_workers
Definition: nat.h:440
snat_get_worker_function_t * worker_out2in_cb
Definition: nat.h:444
snat_hairpin_src_next_t
ip4_address_t addr
Definition: nat.h:246
int snat_hairpinning(snat_main_t *sm, vlib_buffer_t *b0, ip4_header_t *ip0, udp_header_t *udp0, tcp_header_t *tcp0, u32 proto0, int is_ed)
u16 dst_port
Definition: nat.h:1123
Definition: defs.h:47
void nat44_reass_hairpinning(snat_main_t *sm, vlib_buffer_t *b0, ip4_header_t *ip0, u16 sport, u16 dport, u32 proto0, int is_ed)
static int ip4_is_first_fragment(const ip4_header_t *i)
Definition: ip4_packet.h:220
static u32 ip_proto_to_snat_proto(u8 ip_proto)
The NAT inline functions.
Definition: nat_inlines.h:27
u32 hairpinning_node_index
Definition: nat.h:520
VLIB buffer representation.
Definition: buffer.h:102
u64 uword
Definition: types.h:112
snat_main_per_thread_data_t * per_thread_data
Definition: nat.h:449
#define SNAT_FLAG_HAIRPINNING
Definition: nat.h:43
static void * vlib_frame_vector_args(vlib_frame_t *f)
Get pointer to frame vector data.
Definition: node_funcs.h:274
#define ip_csum_update(sum, old, new, type, field)
Definition: ip_packet.h:231
static uword nat44_hairpinning_fn_inline(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame, int is_ed)
snat_address_t * addresses
Definition: nat.h:465
struct _vnet_feature_arc_registration vnet_feature_arc_registration_t
feature registration object
#define vnet_buffer(b)
Definition: buffer.h:369
static uword snat_hairpin_src_fn_inline(vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame, int is_ed)
#define vec_foreach(var, vec)
Vector iterator.
vlib_node_registration_t nat44_hairpinning_node
(constructor) VLIB_REGISTER_NODE (nat44_hairpinning_node)
NAT plugin virtual fragmentation reassembly.
vnet_feature_config_main_t * feature_config_mains
feature config main objects
Definition: feature.h:100
vnet_feature_main_t feature_main
Definition: feature.c:19
vnet_feature_arc_registration_t vnet_feat_arc_ip4_local
snat_session_t * sessions
Definition: nat.h:399
static_always_inline int is_hairpinning(snat_main_t *sm, ip4_address_t *dst_addr)
static vlib_buffer_t * vlib_get_buffer(vlib_main_t *vm, u32 buffer_index)
Translate buffer index into buffer pointer.
Definition: buffer_funcs.h:85
static u16 ip_csum_fold(ip_csum_t c)
Definition: ip_packet.h:237
Definition: defs.h:46
u16 fib_index
Definition: nat.h:54
u8 protocol
Definition: ipsec.api:96
void nat44_ed_hairpinning_unknown_proto(snat_main_t *sm, vlib_buffer_t *b, ip4_header_t *ip)
u32 snat_icmp_hairpinning(snat_main_t *sm, vlib_buffer_t *b0, ip4_header_t *ip0, icmp46_header_t *icmp0, int is_ed)