Home | History | Annotate | Line # | Download | only in npf
npf_connkey.c revision 1.1
      1 /*-
      2  * Copyright (c) 2014-2019 Mindaugas Rasiukevicius <rmind at netbsd org>
      3  * Copyright (c) 2010-2014 The NetBSD Foundation, Inc.
      4  * All rights reserved.
      5  *
      6  * This material is based upon work partially supported by The
      7  * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
      8  *
      9  * Redistribution and use in source and binary forms, with or without
     10  * modification, are permitted provided that the following conditions
     11  * are met:
     12  * 1. Redistributions of source code must retain the above copyright
     13  *    notice, this list of conditions and the following disclaimer.
     14  * 2. Redistributions in binary form must reproduce the above copyright
     15  *    notice, this list of conditions and the following disclaimer in the
     16  *    documentation and/or other materials provided with the distribution.
     17  *
     18  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     19  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     20  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     21  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     22  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     28  * POSSIBILITY OF SUCH DAMAGE.
     29  */
     30 
     31 /*
     32  * Connection key -- is a structure encoding the 5-tuple (protocol, address
     33  * length, source/destination address and source/destination port/ID).
     34  *
     35  * Key layout
     36  *
     37  *	The single key is formed out of 32-bit integers.  The layout is:
     38  *
     39  *	Field: | proto  |  alen  | src-id | dst-id | src-addr | dst-addr |
     40  *	       +--------+--------+--------+--------+----------+----------+
     41  *	Bits:  |   16   |   16   |   16   |   16   |  32-128  |  32-128  |
     42  *
     43  *	The source and destination are inverted if the key is for the
     44  *	backwards stream (forw == false).  The address length depends on
     45  *	the 'alen' field.  The length is in bytes and is either 4 or 16.
     46  *
     47  *	Warning: the keys must be immutable while they are in conndb.
     48  *
     49  * Embedding in the connection structure (npf_conn_t)
     50  *
     51  *	Two keys are stored in the npf_conn_t::c_keys[] array, which is
     52  *	variable-length, depending on whether the keys store IPv4 or IPv6
     53  *	addresses.  The length of the first key determines the position
     54  *	of the second key.
     55  */
     56 
     57 #ifdef _KERNEL
     58 #include <sys/cdefs.h>
     59 __KERNEL_RCSID(0, "$NetBSD: npf_connkey.c,v 1.1 2019/07/23 00:52:01 rmind Exp $");
     60 
     61 #include <sys/param.h>
     62 #include <sys/types.h>
     63 #endif
     64 
     65 #define __NPF_CONN_PRIVATE
     66 #include "npf_conn.h"
     67 #include "npf_impl.h"
     68 
     69 static inline unsigned
     70 connkey_setkey(npf_connkey_t *key, uint16_t proto, const void *ipv,
     71     const uint16_t *id, unsigned alen, bool forw)
     72 {
     73 	const npf_addr_t * const *ips = ipv;
     74 	uint32_t *k = key->ck_key;
     75 	unsigned isrc, idst;
     76 
     77 	if (__predict_true(forw)) {
     78 		isrc = NPF_SRC, idst = NPF_DST;
     79 	} else {
     80 		isrc = NPF_DST, idst = NPF_SRC;
     81 	}
     82 
     83 	/*
     84 	 * See the key layout explanation above.
     85 	 */
     86 
     87 	k[0] = ((uint32_t)proto << 16) | (alen & 0xffff);
     88 	k[1] = ((uint32_t)id[isrc] << 16) | id[idst];
     89 
     90 	if (__predict_true(alen == sizeof(in_addr_t))) {
     91 		k[2] = ips[isrc]->word32[0];
     92 		k[3] = ips[idst]->word32[0];
     93 		return 4 * sizeof(uint32_t);
     94 	} else {
     95 		const unsigned nwords = alen >> 2;
     96 		memcpy(&k[2], ips[isrc], alen);
     97 		memcpy(&k[2 + nwords], ips[idst], alen);
     98 		return (2 + (nwords * 2)) * sizeof(uint32_t);
     99 	}
    100 }
    101 
    102 static inline void
    103 connkey_getkey(const npf_connkey_t *key, uint16_t *proto, npf_addr_t *ips,
    104     uint16_t *id, uint16_t *alen)
    105 {
    106 	const uint32_t *k = key->ck_key;
    107 
    108 	/*
    109 	 * See the key layout explanation above.
    110 	 */
    111 
    112 	*proto = k[0] >> 16;
    113 	*alen = k[0] & 0xffff;
    114 	id[NPF_SRC] = k[1] >> 16;
    115 	id[NPF_DST] = k[1] & 0xffff;
    116 
    117 	switch (*alen) {
    118 	case sizeof(struct in6_addr):
    119 	case sizeof(struct in_addr):
    120 		memcpy(&ips[NPF_SRC], &k[2], *alen);
    121 		memcpy(&ips[NPF_DST], &k[2 + ((unsigned)*alen >> 2)], *alen);
    122 		return;
    123 	default:
    124 		KASSERT(0);
    125 	}
    126 }
    127 
    128 /*
    129  * npf_conn_adjkey: adjust the connection key by resetting the address/port.
    130  */
    131 void
    132 npf_conn_adjkey(npf_connkey_t *key, const npf_addr_t *naddr,
    133     const uint16_t id, const int di)
    134 {
    135 	uint32_t * const k = key->ck_key;
    136 	const unsigned alen = k[0] & 0xffff;
    137 	uint32_t *addr = &k[2 + ((alen >> 2) * di)];
    138 
    139 	KASSERT(alen > 0);
    140 	memcpy(addr, naddr, alen);
    141 
    142 	if (id) {
    143 		const uint32_t oid = k[1];
    144 		const unsigned shift = 16 * !di;
    145 		const uint32_t mask = 0xffff0000 >> shift;
    146 		k[1] = ((uint32_t)id << shift) | (oid & mask);
    147 	}
    148 }
    149 
    150 /*
    151  * npf_conn_conkey: construct a key for the connection lookup.
    152  *
    153  * => Returns the key length in bytes or zero on failure.
    154  */
    155 unsigned
    156 npf_conn_conkey(const npf_cache_t *npc, npf_connkey_t *key, const bool forw)
    157 {
    158 	const unsigned proto = npc->npc_proto;
    159 	const unsigned alen = npc->npc_alen;
    160 	const struct tcphdr *th;
    161 	const struct udphdr *uh;
    162 	uint16_t id[2] = { 0, 0 };
    163 
    164 	switch (proto) {
    165 	case IPPROTO_TCP:
    166 		KASSERT(npf_iscached(npc, NPC_TCP));
    167 		th = npc->npc_l4.tcp;
    168 		id[NPF_SRC] = th->th_sport;
    169 		id[NPF_DST] = th->th_dport;
    170 		break;
    171 	case IPPROTO_UDP:
    172 		KASSERT(npf_iscached(npc, NPC_UDP));
    173 		uh = npc->npc_l4.udp;
    174 		id[NPF_SRC] = uh->uh_sport;
    175 		id[NPF_DST] = uh->uh_dport;
    176 		break;
    177 	case IPPROTO_ICMP:
    178 		if (npf_iscached(npc, NPC_ICMP_ID)) {
    179 			const struct icmp *ic = npc->npc_l4.icmp;
    180 			id[NPF_SRC] = ic->icmp_id;
    181 			id[NPF_DST] = ic->icmp_id;
    182 			break;
    183 		}
    184 		return 0;
    185 	case IPPROTO_ICMPV6:
    186 		if (npf_iscached(npc, NPC_ICMP_ID)) {
    187 			const struct icmp6_hdr *ic6 = npc->npc_l4.icmp6;
    188 			id[NPF_SRC] = ic6->icmp6_id;
    189 			id[NPF_DST] = ic6->icmp6_id;
    190 			break;
    191 		}
    192 		return 0;
    193 	default:
    194 		/* Unsupported protocol. */
    195 		return 0;
    196 	}
    197 	return connkey_setkey(key, proto, npc->npc_ips, id, alen, forw);
    198 }
    199 
    200 /*
    201  * npf_conn_getforwkey: get the address to the "forwards" key.
    202  */
    203 npf_connkey_t *
    204 npf_conn_getforwkey(npf_conn_t *conn)
    205 {
    206 	return (void *)&conn->c_keys[0];
    207 }
    208 
    209 /*
    210  * npf_conn_getbackkey: get the address to the "backwards" key.
    211  *
    212  * => It depends on the address length.
    213  */
    214 npf_connkey_t *
    215 npf_conn_getbackkey(npf_conn_t *conn, unsigned alen)
    216 {
    217 	const unsigned off = 2 + ((alen * 2) >> 2);
    218 	KASSERT(off == NPF_CONNKEY_V4WORDS || off == NPF_CONNKEY_V6WORDS);
    219 	return (void *)&conn->c_keys[off];
    220 }
    221 
    222 /*
    223  * Connection key exporting/importing.
    224  */
    225 
    226 nvlist_t *
    227 npf_connkey_export(const npf_connkey_t *key)
    228 {
    229 	uint16_t ids[2], alen, proto;
    230 	npf_addr_t ips[2];
    231 	nvlist_t *kdict;
    232 
    233 	kdict = nvlist_create(0);
    234 	connkey_getkey(key, &proto, ips, ids, &alen);
    235 	nvlist_add_number(kdict, "proto", proto);
    236 	nvlist_add_number(kdict, "sport", ids[NPF_SRC]);
    237 	nvlist_add_number(kdict, "dport", ids[NPF_DST]);
    238 	nvlist_add_binary(kdict, "saddr", &ips[NPF_SRC], alen);
    239 	nvlist_add_binary(kdict, "daddr", &ips[NPF_DST], alen);
    240 	return kdict;
    241 }
    242 
    243 unsigned
    244 npf_connkey_import(const nvlist_t *kdict, npf_connkey_t *key)
    245 {
    246 	npf_addr_t const * ips[2];
    247 	uint16_t proto, ids[2];
    248 	size_t alen1, alen2;
    249 
    250 	proto = dnvlist_get_number(kdict, "proto", 0);
    251 	ids[NPF_SRC] = dnvlist_get_number(kdict, "sport", 0);
    252 	ids[NPF_DST] = dnvlist_get_number(kdict, "dport", 0);
    253 	ips[NPF_SRC] = dnvlist_get_binary(kdict, "saddr", &alen1, NULL, 0);
    254 	ips[NPF_DST] = dnvlist_get_binary(kdict, "daddr", &alen2, NULL, 0);
    255 	if (alen1 == 0 || alen1 > sizeof(npf_addr_t) || alen1 != alen2) {
    256 		return 0;
    257 	}
    258 	return connkey_setkey(key, proto, ips, ids, alen1, true);
    259 }
    260 
    261 #if defined(DDB) || defined(_NPF_TESTING)
    262 
    263 void
    264 npf_connkey_print(const npf_connkey_t *key)
    265 {
    266 	uint16_t proto, ids[2], alen;
    267 	npf_addr_t ips[2];
    268 
    269 	connkey_getkey(key, &proto, ips, ids, &alen);
    270 	printf("\tforw %s:%d", npf_addr_dump(&ips[0], alen), ids[0]);
    271 	printf("-> %s:%d\n", npf_addr_dump(&ips[1], alen), ids[1]);
    272 }
    273 
    274 #endif
    275