Home | History | Annotate | Line # | Download | only in npf
npf_alg_icmp.c revision 1.12.2.1
      1  1.12.2.1     tls /*	$NetBSD: npf_alg_icmp.c,v 1.12.2.1 2012/11/20 03:02:47 tls Exp $	*/
      2       1.1   rmind 
      3       1.1   rmind /*-
      4       1.1   rmind  * Copyright (c) 2010 The NetBSD Foundation, Inc.
      5       1.1   rmind  * All rights reserved.
      6       1.1   rmind  *
      7       1.1   rmind  * This material is based upon work partially supported by The
      8       1.1   rmind  * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
      9       1.1   rmind  *
     10       1.1   rmind  * Redistribution and use in source and binary forms, with or without
     11       1.1   rmind  * modification, are permitted provided that the following conditions
     12       1.1   rmind  * are met:
     13       1.1   rmind  * 1. Redistributions of source code must retain the above copyright
     14       1.1   rmind  *    notice, this list of conditions and the following disclaimer.
     15       1.1   rmind  * 2. Redistributions in binary form must reproduce the above copyright
     16       1.1   rmind  *    notice, this list of conditions and the following disclaimer in the
     17       1.1   rmind  *    documentation and/or other materials provided with the distribution.
     18       1.1   rmind  *
     19       1.1   rmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20       1.1   rmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21       1.1   rmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22       1.1   rmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23       1.1   rmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24       1.1   rmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25       1.1   rmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26       1.1   rmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27       1.1   rmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28       1.1   rmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29       1.1   rmind  * POSSIBILITY OF SUCH DAMAGE.
     30       1.1   rmind  */
     31       1.1   rmind 
     32       1.1   rmind /*
     33       1.1   rmind  * NPF ALG for ICMP and traceroute translations.
     34       1.1   rmind  */
     35       1.1   rmind 
     36       1.1   rmind #include <sys/cdefs.h>
     37  1.12.2.1     tls __KERNEL_RCSID(0, "$NetBSD: npf_alg_icmp.c,v 1.12.2.1 2012/11/20 03:02:47 tls Exp $");
     38       1.1   rmind 
     39       1.1   rmind #include <sys/param.h>
     40       1.1   rmind #include <sys/module.h>
     41       1.1   rmind #include <sys/pool.h>
     42       1.1   rmind 
     43       1.1   rmind #include <netinet/in_systm.h>
     44       1.1   rmind #include <netinet/in.h>
     45       1.1   rmind #include <netinet/ip.h>
     46       1.1   rmind #include <netinet/tcp.h>
     47       1.1   rmind #include <netinet/udp.h>
     48       1.1   rmind #include <netinet/ip_icmp.h>
     49      1.11     spz #include <netinet/icmp6.h>
     50       1.1   rmind #include <net/pfil.h>
     51       1.1   rmind 
     52       1.1   rmind #include "npf_impl.h"
     53       1.1   rmind 
     54       1.1   rmind MODULE(MODULE_CLASS_MISC, npf_alg_icmp, "npf");
     55       1.1   rmind 
     56       1.1   rmind /*
     57       1.1   rmind  * Traceroute criteria.
     58       1.1   rmind  *
     59       1.1   rmind  * IANA assigned base port: 33434.  However, common practice is to increase
     60       1.1   rmind  * the port, thus monitor [33434-33484] range.  Additional filter is TTL < 50.
     61       1.1   rmind  */
     62       1.1   rmind 
     63       1.1   rmind #define	TR_BASE_PORT	33434
     64       1.1   rmind #define	TR_PORT_RANGE	33484
     65       1.1   rmind #define	TR_MAX_TTL	50
     66       1.1   rmind 
     67       1.6   rmind static npf_alg_t *	alg_icmp	__read_mostly;
     68       1.1   rmind 
     69       1.1   rmind static bool		npfa_icmp_match(npf_cache_t *, nbuf_t *, void *);
     70       1.1   rmind static bool		npfa_icmp_natin(npf_cache_t *, nbuf_t *, void *);
     71       1.1   rmind static bool		npfa_icmp_session(npf_cache_t *, nbuf_t *, void *);
     72       1.1   rmind 
     73       1.1   rmind /*
     74       1.1   rmind  * npf_alg_icmp_{init,fini,modcmd}: ICMP ALG initialization, destruction
     75       1.1   rmind  * and module interface.
     76       1.1   rmind  */
     77       1.1   rmind 
     78       1.1   rmind static int
     79       1.1   rmind npf_alg_icmp_init(void)
     80       1.1   rmind {
     81       1.1   rmind 
     82       1.1   rmind 	alg_icmp = npf_alg_register(npfa_icmp_match, NULL,
     83       1.1   rmind 	    npfa_icmp_natin, npfa_icmp_session);
     84       1.1   rmind 	KASSERT(alg_icmp != NULL);
     85       1.1   rmind 	return 0;
     86       1.1   rmind }
     87       1.1   rmind 
     88       1.1   rmind static int
     89       1.1   rmind npf_alg_icmp_fini(void)
     90       1.1   rmind {
     91       1.1   rmind 
     92       1.1   rmind 	KASSERT(alg_icmp != NULL);
     93       1.1   rmind 	return npf_alg_unregister(alg_icmp);
     94       1.1   rmind }
     95       1.1   rmind 
     96       1.1   rmind static int
     97       1.1   rmind npf_alg_icmp_modcmd(modcmd_t cmd, void *arg)
     98       1.1   rmind {
     99       1.1   rmind 
    100       1.1   rmind 	switch (cmd) {
    101       1.1   rmind 	case MODULE_CMD_INIT:
    102       1.1   rmind 		return npf_alg_icmp_init();
    103       1.1   rmind 	case MODULE_CMD_FINI:
    104       1.1   rmind 		return npf_alg_icmp_fini();
    105      1.10   rmind 	case MODULE_CMD_AUTOUNLOAD:
    106      1.10   rmind 		return EBUSY;
    107       1.1   rmind 	default:
    108       1.1   rmind 		return ENOTTY;
    109       1.1   rmind 	}
    110       1.1   rmind 	return 0;
    111       1.1   rmind }
    112       1.1   rmind 
    113       1.1   rmind /*
    114       1.4   rmind  * npfa_icmp_match: ALG matching inspector - determines ALG case and
    115       1.4   rmind  * associates ALG with NAT entry.
    116       1.1   rmind  */
    117       1.1   rmind static bool
    118       1.1   rmind npfa_icmp_match(npf_cache_t *npc, nbuf_t *nbuf, void *ntptr)
    119       1.1   rmind {
    120       1.4   rmind 	const int proto = npf_cache_ipproto(npc);
    121       1.4   rmind 	struct ip *ip = &npc->npc_ip.v4;
    122       1.4   rmind 	in_port_t dport;
    123       1.4   rmind 
    124       1.7  zoltan 	KASSERT(npf_iscached(npc, NPC_IP46));
    125       1.7  zoltan 	KASSERT(npf_iscached(npc, NPC_LAYER4));
    126       1.4   rmind 
    127       1.6   rmind 	/* Check for low TTL. */
    128       1.6   rmind 	if (ip->ip_ttl > TR_MAX_TTL) {
    129       1.6   rmind 		return false;
    130       1.6   rmind 	}
    131       1.6   rmind 
    132       1.4   rmind 	if (proto == IPPROTO_TCP) {
    133       1.4   rmind 		struct tcphdr *th = &npc->npc_l4.tcp;
    134       1.4   rmind 		dport = ntohs(th->th_dport);
    135       1.4   rmind 	} else if (proto == IPPROTO_UDP) {
    136       1.4   rmind 		struct udphdr *uh = &npc->npc_l4.udp;
    137       1.4   rmind 		dport = ntohs(uh->uh_dport);
    138       1.4   rmind 	} else {
    139       1.4   rmind 		return false;
    140       1.4   rmind 	}
    141       1.1   rmind 
    142       1.1   rmind 	/* Handle TCP/UDP traceroute - check for port range. */
    143       1.1   rmind 	if (dport < TR_BASE_PORT || dport > TR_PORT_RANGE) {
    144       1.1   rmind 		return false;
    145       1.1   rmind 	}
    146       1.1   rmind 
    147       1.1   rmind 	/* Associate ALG with translation entry. */
    148       1.1   rmind 	npf_nat_t *nt = ntptr;
    149       1.1   rmind 	npf_nat_setalg(nt, alg_icmp, 0);
    150       1.1   rmind 	return true;
    151       1.1   rmind }
    152       1.1   rmind 
    153       1.1   rmind /*
    154  1.12.2.1     tls  * npf_icmp{4,6}_uniqid: retrieve unique identifiers - either ICMP query ID
    155       1.1   rmind  * or TCP/UDP ports of the original packet, which is embedded.
    156       1.1   rmind  */
    157  1.12.2.1     tls 
    158       1.5   rmind static bool
    159  1.12.2.1     tls npf_icmp4_uniqid(const int type, npf_cache_t *npc, nbuf_t *nbuf, void *n_ptr)
    160       1.1   rmind {
    161  1.12.2.1     tls 	struct icmp *ic;
    162  1.12.2.1     tls 	u_int offby;
    163      1.11     spz 
    164  1.12.2.1     tls 	/* Per RFC 792. */
    165  1.12.2.1     tls 	switch (type) {
    166  1.12.2.1     tls 	case ICMP_UNREACH:
    167  1.12.2.1     tls 	case ICMP_SOURCEQUENCH:
    168  1.12.2.1     tls 	case ICMP_REDIRECT:
    169  1.12.2.1     tls 	case ICMP_TIMXCEED:
    170  1.12.2.1     tls 	case ICMP_PARAMPROB:
    171  1.12.2.1     tls 		/* Should contain original IP header. */
    172  1.12.2.1     tls 		offby = offsetof(struct icmp, icmp_ip);
    173  1.12.2.1     tls 		if ((n_ptr = nbuf_advance(&nbuf, n_ptr, offby)) == NULL) {
    174  1.12.2.1     tls 			return false;
    175  1.12.2.1     tls 		}
    176  1.12.2.1     tls 		/* Fetch into the cache. */
    177  1.12.2.1     tls 		if (!npf_fetch_ip(npc, nbuf, n_ptr)) {
    178  1.12.2.1     tls 			return false;
    179  1.12.2.1     tls 		}
    180  1.12.2.1     tls 		switch (npf_cache_ipproto(npc)) {
    181  1.12.2.1     tls 		case IPPROTO_TCP:
    182  1.12.2.1     tls 			return npf_fetch_tcp(npc, nbuf, n_ptr);
    183  1.12.2.1     tls 		case IPPROTO_UDP:
    184  1.12.2.1     tls 			return npf_fetch_udp(npc, nbuf, n_ptr);
    185      1.11     spz 		default:
    186  1.12.2.1     tls 			return false;
    187       1.1   rmind 		}
    188  1.12.2.1     tls 		return true;
    189  1.12.2.1     tls 
    190  1.12.2.1     tls 	case ICMP_ECHOREPLY:
    191  1.12.2.1     tls 	case ICMP_ECHO:
    192  1.12.2.1     tls 	case ICMP_TSTAMP:
    193  1.12.2.1     tls 	case ICMP_TSTAMPREPLY:
    194  1.12.2.1     tls 	case ICMP_IREQ:
    195  1.12.2.1     tls 	case ICMP_IREQREPLY:
    196  1.12.2.1     tls 		/* Should contain ICMP query ID. */
    197  1.12.2.1     tls 		ic = &npc->npc_l4.icmp;
    198  1.12.2.1     tls 		offby = offsetof(struct icmp, icmp_id);
    199  1.12.2.1     tls 		if (nbuf_advfetch(&nbuf, &n_ptr, offby,
    200  1.12.2.1     tls 		    sizeof(uint16_t), &ic->icmp_id)) {
    201  1.12.2.1     tls 			return false;
    202  1.12.2.1     tls 		}
    203  1.12.2.1     tls 		npc->npc_info |= NPC_ICMP_ID;
    204  1.12.2.1     tls 		return true;
    205  1.12.2.1     tls 	default:
    206  1.12.2.1     tls 		break;
    207      1.11     spz 	}
    208  1.12.2.1     tls 	/* No unique IDs. */
    209  1.12.2.1     tls 	return false;
    210  1.12.2.1     tls }
    211  1.12.2.1     tls 
    212  1.12.2.1     tls static bool
    213  1.12.2.1     tls npf_icmp6_uniqid(const int type, npf_cache_t *npc, nbuf_t *nbuf, void *n_ptr)
    214  1.12.2.1     tls {
    215  1.12.2.1     tls 	struct icmp6_hdr *ic6;
    216  1.12.2.1     tls 	u_int offby;
    217  1.12.2.1     tls 
    218  1.12.2.1     tls 	/* Per RFC 4443. */
    219  1.12.2.1     tls 	switch (type) {
    220  1.12.2.1     tls 	case ICMP6_DST_UNREACH:
    221  1.12.2.1     tls 	case ICMP6_PACKET_TOO_BIG:
    222  1.12.2.1     tls 	case ICMP6_TIME_EXCEEDED:
    223  1.12.2.1     tls 	case ICMP6_PARAM_PROB:
    224  1.12.2.1     tls 		/* Should contain original IP header. */
    225  1.12.2.1     tls 		offby = sizeof(struct icmp6_hdr);
    226  1.12.2.1     tls 		if ((n_ptr = nbuf_advance(&nbuf, n_ptr, offby)) == NULL) {
    227  1.12.2.1     tls 			return false;
    228  1.12.2.1     tls 		}
    229  1.12.2.1     tls 		/* Fetch into the cache. */
    230  1.12.2.1     tls 		if (!npf_fetch_ip(npc, nbuf, n_ptr)) {
    231  1.12.2.1     tls 			return false;
    232  1.12.2.1     tls 		}
    233  1.12.2.1     tls 		switch (npf_cache_ipproto(npc)) {
    234  1.12.2.1     tls 		case IPPROTO_TCP:
    235  1.12.2.1     tls 			return npf_fetch_tcp(npc, nbuf, n_ptr);
    236  1.12.2.1     tls 		case IPPROTO_UDP:
    237  1.12.2.1     tls 			return npf_fetch_udp(npc, nbuf, n_ptr);
    238       1.4   rmind 		default:
    239  1.12.2.1     tls 			return false;
    240       1.1   rmind 		}
    241  1.12.2.1     tls 		return true;
    242  1.12.2.1     tls 
    243  1.12.2.1     tls 	case ICMP6_ECHO_REQUEST:
    244  1.12.2.1     tls 	case ICMP6_ECHO_REPLY:
    245  1.12.2.1     tls 		/* Should contain ICMP query ID. */
    246  1.12.2.1     tls 		ic6 = &npc->npc_l4.icmp6;
    247  1.12.2.1     tls 		offby = offsetof(struct icmp6_hdr, icmp6_id);
    248  1.12.2.1     tls 		if (nbuf_advfetch(&nbuf, &n_ptr, offby,
    249  1.12.2.1     tls 		    sizeof(uint16_t), &ic6->icmp6_id)) {
    250  1.12.2.1     tls 			return false;
    251  1.12.2.1     tls 		}
    252  1.12.2.1     tls 		npc->npc_info |= NPC_ICMP_ID;
    253  1.12.2.1     tls 		return true;
    254  1.12.2.1     tls 	default:
    255  1.12.2.1     tls 		break;
    256       1.1   rmind 	}
    257  1.12.2.1     tls 	/* No unique IDs. */
    258       1.1   rmind 	return false;
    259       1.1   rmind }
    260       1.1   rmind 
    261       1.6   rmind static void
    262       1.6   rmind npfa_srcdst_invert(npf_cache_t *npc)
    263       1.6   rmind {
    264       1.6   rmind 	const int proto = npf_cache_ipproto(npc);
    265       1.6   rmind 	npf_addr_t *tmp_ip;
    266       1.6   rmind 
    267       1.6   rmind 	if (proto == IPPROTO_TCP) {
    268       1.6   rmind 		struct tcphdr *th = &npc->npc_l4.tcp;
    269       1.6   rmind 		in_port_t tmp_sport = th->th_sport;
    270       1.6   rmind 		th->th_sport = th->th_dport;
    271       1.6   rmind 		th->th_dport = tmp_sport;
    272       1.6   rmind 
    273       1.6   rmind 	} else if (proto == IPPROTO_UDP) {
    274       1.6   rmind 		struct udphdr *uh = &npc->npc_l4.udp;
    275       1.6   rmind 		in_port_t tmp_sport = uh->uh_sport;
    276       1.6   rmind 		uh->uh_sport = uh->uh_dport;
    277       1.6   rmind 		uh->uh_dport = tmp_sport;
    278       1.6   rmind 	}
    279       1.6   rmind 	tmp_ip = npc->npc_srcip;
    280       1.6   rmind 	npc->npc_srcip = npc->npc_dstip;
    281       1.6   rmind 	npc->npc_dstip = tmp_ip;
    282       1.6   rmind }
    283       1.6   rmind 
    284       1.1   rmind /*
    285       1.6   rmind  * npfa_icmp_session: ALG session inspector, returns unique identifiers.
    286       1.1   rmind  */
    287       1.1   rmind static bool
    288       1.1   rmind npfa_icmp_session(npf_cache_t *npc, nbuf_t *nbuf, void *keyptr)
    289       1.1   rmind {
    290       1.1   rmind 	npf_cache_t *key = keyptr;
    291  1.12.2.1     tls 	bool ret;
    292  1.12.2.1     tls 
    293       1.6   rmind 	KASSERT(key->npc_info == 0);
    294       1.1   rmind 
    295       1.6   rmind 	/* IP + ICMP?  Get unique identifiers from ICMP packet. */
    296       1.6   rmind 	if (!npf_iscached(npc, NPC_IP4)) {
    297       1.6   rmind 		return false;
    298       1.6   rmind 	}
    299       1.4   rmind 	if (npf_cache_ipproto(npc) != IPPROTO_ICMP) {
    300       1.1   rmind 		return false;
    301       1.1   rmind 	}
    302       1.4   rmind 	KASSERT(npf_iscached(npc, NPC_ICMP));
    303       1.1   rmind 
    304       1.1   rmind 	/* Advance to ICMP header. */
    305       1.4   rmind 	void *n_ptr = nbuf_dataptr(nbuf);
    306       1.8   rmind 	const u_int hlen = npf_cache_hlen(npc);
    307       1.4   rmind 
    308       1.7  zoltan 	if ((n_ptr = nbuf_advance(&nbuf, n_ptr, hlen)) == NULL) {
    309       1.1   rmind 		return false;
    310       1.1   rmind 	}
    311       1.1   rmind 
    312  1.12.2.1     tls 	/*
    313  1.12.2.1     tls 	 * Fetch relevant data into the separate ("key") cache.
    314  1.12.2.1     tls 	 */
    315       1.4   rmind 	struct icmp *ic = &npc->npc_l4.icmp;
    316  1.12.2.1     tls 
    317  1.12.2.1     tls 	if (npf_iscached(npc, NPC_IP4)) {
    318  1.12.2.1     tls 		ret = npf_icmp4_uniqid(ic->icmp_type, key, nbuf, n_ptr);
    319  1.12.2.1     tls 	} else if (npf_iscached(npc, NPC_IP6)) {
    320  1.12.2.1     tls 		KASSERT(offsetof(struct icmp, icmp_id) ==
    321  1.12.2.1     tls 		    offsetof(struct icmp6_hdr, icmp6_id));
    322  1.12.2.1     tls 		ret = npf_icmp6_uniqid(ic->icmp_type, key, nbuf, n_ptr);
    323  1.12.2.1     tls 	} else {
    324  1.12.2.1     tls 		ret = false;
    325  1.12.2.1     tls 	}
    326  1.12.2.1     tls 
    327  1.12.2.1     tls 	if (!ret) {
    328       1.1   rmind 		return false;
    329       1.1   rmind 	}
    330       1.1   rmind 
    331       1.1   rmind 	if (npf_iscached(key, NPC_ICMP_ID)) {
    332       1.4   rmind 		struct icmp *keyic = &key->npc_l4.icmp;
    333       1.4   rmind 
    334       1.4   rmind 		/* Copy ICMP ID to the cache and flag it. */
    335       1.4   rmind 		npc->npc_info |= NPC_ICMP_ID;
    336       1.4   rmind 		ic->icmp_id = keyic->icmp_id;
    337       1.4   rmind 
    338       1.6   rmind 		/* Note: return False, since key is the original cache. */
    339       1.4   rmind 		return false;
    340       1.1   rmind 	}
    341       1.4   rmind 
    342       1.4   rmind 	/*
    343       1.4   rmind 	 * Embedded IP packet is the original of "forwards" stream.
    344       1.4   rmind 	 * We should imitate the "backwards" stream for inspection.
    345       1.4   rmind 	 */
    346       1.4   rmind 	KASSERT(npf_iscached(key, NPC_IP46));
    347       1.4   rmind 	KASSERT(npf_iscached(key, NPC_LAYER4));
    348       1.6   rmind 	npfa_srcdst_invert(key);
    349      1.10   rmind 	key->npc_alen = npc->npc_alen;
    350       1.4   rmind 
    351       1.1   rmind 	return true;
    352       1.1   rmind }
    353       1.1   rmind 
    354       1.1   rmind /*
    355       1.1   rmind  * npfa_icmp_natin: ALG inbound translation inspector, rewrite IP address
    356       1.1   rmind  * in the IP header, which is embedded in ICMP packet.
    357       1.1   rmind  */
    358       1.1   rmind static bool
    359       1.1   rmind npfa_icmp_natin(npf_cache_t *npc, nbuf_t *nbuf, void *ntptr)
    360       1.1   rmind {
    361       1.6   rmind 	npf_cache_t enpc = { .npc_info = 0 };
    362       1.1   rmind 
    363       1.6   rmind 	/* XXX: Duplicated work (done at session inspection). */
    364       1.1   rmind 	if (!npfa_icmp_session(npc, nbuf, &enpc)) {
    365       1.1   rmind 		return false;
    366       1.1   rmind 	}
    367       1.6   rmind 	/* XXX: Restore inversion (inefficient). */
    368       1.7  zoltan 	KASSERT(npf_iscached(&enpc, NPC_IP46));
    369       1.7  zoltan 	KASSERT(npf_iscached(&enpc, NPC_LAYER4));
    370       1.6   rmind 	npfa_srcdst_invert(&enpc);
    371       1.1   rmind 
    372       1.6   rmind 	/*
    373       1.6   rmind 	 * Save ICMP and embedded IP with TCP/UDP header checksums, retrieve
    374       1.6   rmind 	 * the original address and port, and calculate ICMP checksum for
    375       1.6   rmind 	 * embedded packet changes, while data is not rewritten in the cache.
    376       1.6   rmind 	 */
    377       1.4   rmind 	const int proto = npf_cache_ipproto(&enpc);
    378       1.7  zoltan 	const struct ip *eip = &enpc.npc_ip.v4;
    379       1.6   rmind 	const struct icmp * const ic = &npc->npc_l4.icmp;
    380       1.6   rmind 	uint16_t cksum = ic->icmp_cksum, ecksum = eip->ip_sum, l4cksum;
    381       1.6   rmind 	npf_nat_t *nt = ntptr;
    382       1.6   rmind 	npf_addr_t *addr;
    383       1.6   rmind 	in_port_t port;
    384       1.6   rmind 
    385       1.6   rmind 	npf_nat_getorig(nt, &addr, &port);
    386       1.4   rmind 
    387       1.4   rmind 	if (proto == IPPROTO_TCP) {
    388       1.4   rmind 		struct tcphdr *th = &enpc.npc_l4.tcp;
    389       1.6   rmind 		cksum = npf_fixup16_cksum(cksum, th->th_sport, port);
    390       1.4   rmind 		l4cksum = th->th_sum;
    391       1.4   rmind 	} else {
    392       1.4   rmind 		struct udphdr *uh = &enpc.npc_l4.udp;
    393       1.6   rmind 		cksum = npf_fixup16_cksum(cksum, uh->uh_sport, port);
    394       1.4   rmind 		l4cksum = uh->uh_sum;
    395       1.1   rmind 	}
    396      1.10   rmind 	cksum = npf_addr_cksum(cksum, enpc.npc_alen, enpc.npc_srcip, addr);
    397       1.6   rmind 
    398       1.6   rmind 	/*
    399       1.6   rmind 	 * Save the original pointers to the main IP header and then advance
    400       1.6   rmind 	 * to the embedded IP header after ICMP header.
    401       1.6   rmind 	 */
    402       1.6   rmind 	void *n_ptr = nbuf_dataptr(nbuf), *cnbuf = nbuf, *cnptr = n_ptr;
    403       1.8   rmind 	u_int offby = npf_cache_hlen(npc) + offsetof(struct icmp, icmp_ip);
    404       1.1   rmind 
    405       1.1   rmind 	if ((n_ptr = nbuf_advance(&nbuf, n_ptr, offby)) == NULL) {
    406       1.1   rmind 		return false;
    407       1.1   rmind 	}
    408       1.1   rmind 
    409       1.4   rmind 	/*
    410       1.4   rmind 	 * Rewrite source IP address and port of the embedded IP header,
    411       1.4   rmind 	 * which represents original packet - therefore passing PFIL_OUT.
    412       1.6   rmind 	 * Note: checksums are first, since it uses values from the cache.
    413       1.4   rmind 	 */
    414       1.4   rmind 	if (!npf_rwrcksum(&enpc, nbuf, n_ptr, PFIL_OUT, addr, port)) {
    415       1.4   rmind 		return false;
    416       1.4   rmind 	}
    417       1.1   rmind 	if (!npf_rwrip(&enpc, nbuf, n_ptr, PFIL_OUT, addr)) {
    418       1.1   rmind 		return false;
    419       1.1   rmind 	}
    420       1.4   rmind 	if (!npf_rwrport(&enpc, nbuf, n_ptr, PFIL_OUT, port)) {
    421       1.1   rmind 		return false;
    422       1.1   rmind 	}
    423       1.1   rmind 
    424       1.1   rmind 	/*
    425       1.6   rmind 	 * Finish calculation of the ICMP checksum.  Update for embedded IP
    426       1.6   rmind 	 * and TCP/UDP checksum changes.  Finally, rewrite ICMP checksum.
    427       1.1   rmind 	 */
    428       1.4   rmind 	if (proto == IPPROTO_TCP) {
    429       1.4   rmind 		struct tcphdr *th = &enpc.npc_l4.tcp;
    430       1.4   rmind 		cksum = npf_fixup16_cksum(cksum, l4cksum, th->th_sum);
    431       1.6   rmind 	} else if (l4cksum) {
    432       1.4   rmind 		struct udphdr *uh = &enpc.npc_l4.udp;
    433       1.4   rmind 		cksum = npf_fixup16_cksum(cksum, l4cksum, uh->uh_sum);
    434       1.1   rmind 	}
    435       1.6   rmind 	cksum = npf_fixup16_cksum(cksum, ecksum, eip->ip_sum);
    436       1.4   rmind 
    437       1.8   rmind 	offby = npf_cache_hlen(npc) + offsetof(struct icmp, icmp_cksum);
    438       1.6   rmind 	if (nbuf_advstore(&cnbuf, &cnptr, offby, sizeof(uint16_t), &cksum)) {
    439       1.6   rmind 		return false;
    440       1.6   rmind 	}
    441       1.6   rmind 	return true;
    442       1.1   rmind }
    443