Home | History | Annotate | Line # | Download | only in npf
npf_sendpkt.c revision 1.12.2.2
      1  1.12.2.2     tls /*	$NetBSD: npf_sendpkt.c,v 1.12.2.2 2014/08/20 00:04:35 tls Exp $	*/
      2       1.1   rmind 
      3       1.1   rmind /*-
      4       1.8   rmind  * Copyright (c) 2010-2011 The NetBSD Foundation, Inc.
      5       1.1   rmind  * All rights reserved.
      6       1.1   rmind  *
      7       1.1   rmind  * This material is based upon work partially supported by The
      8       1.1   rmind  * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
      9       1.1   rmind  *
     10       1.1   rmind  * Redistribution and use in source and binary forms, with or without
     11       1.1   rmind  * modification, are permitted provided that the following conditions
     12       1.1   rmind  * are met:
     13       1.1   rmind  * 1. Redistributions of source code must retain the above copyright
     14       1.1   rmind  *    notice, this list of conditions and the following disclaimer.
     15       1.1   rmind  * 2. Redistributions in binary form must reproduce the above copyright
     16       1.1   rmind  *    notice, this list of conditions and the following disclaimer in the
     17       1.1   rmind  *    documentation and/or other materials provided with the distribution.
     18       1.1   rmind  *
     19       1.1   rmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20       1.1   rmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21       1.1   rmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22       1.1   rmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23       1.1   rmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24       1.1   rmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25       1.1   rmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26       1.1   rmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27       1.1   rmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28       1.1   rmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29       1.1   rmind  * POSSIBILITY OF SUCH DAMAGE.
     30       1.1   rmind  */
     31       1.1   rmind 
     32       1.1   rmind /*
     33       1.1   rmind  * NPF module for packet construction routines.
     34       1.1   rmind  */
     35       1.1   rmind 
     36       1.1   rmind #include <sys/cdefs.h>
     37  1.12.2.2     tls __KERNEL_RCSID(0, "$NetBSD: npf_sendpkt.c,v 1.12.2.2 2014/08/20 00:04:35 tls Exp $");
     38       1.1   rmind 
     39       1.1   rmind #include <sys/param.h>
     40       1.9   rmind #include <sys/types.h>
     41       1.1   rmind 
     42       1.1   rmind #include <netinet/in_systm.h>
     43       1.1   rmind #include <netinet/in.h>
     44       1.1   rmind #include <netinet/ip.h>
     45       1.1   rmind #include <netinet/ip_icmp.h>
     46       1.1   rmind #include <netinet/ip_var.h>
     47       1.1   rmind #include <netinet/tcp.h>
     48       1.5  zoltan #include <netinet/ip6.h>
     49       1.5  zoltan #include <netinet/icmp6.h>
     50       1.5  zoltan #include <netinet6/ip6_var.h>
     51       1.1   rmind #include <sys/mbuf.h>
     52       1.1   rmind 
     53       1.1   rmind #include "npf_impl.h"
     54       1.1   rmind 
     55       1.1   rmind #define	DEFAULT_IP_TTL		(ip_defttl)
     56       1.1   rmind 
     57      1.10   rmind #ifndef INET6
     58      1.10   rmind #define	in6_cksum(...)		0
     59      1.10   rmind #define	ip6_output(...)		0
     60      1.10   rmind #define	icmp6_error(m, ...)	m_freem(m)
     61      1.10   rmind #endif
     62      1.10   rmind 
     63       1.1   rmind /*
     64       1.1   rmind  * npf_return_tcp: return a TCP reset (RST) packet.
     65       1.1   rmind  */
     66       1.1   rmind static int
     67       1.8   rmind npf_return_tcp(npf_cache_t *npc)
     68       1.1   rmind {
     69       1.1   rmind 	struct mbuf *m;
     70       1.5  zoltan 	struct ip *ip = NULL;
     71       1.5  zoltan 	struct ip6_hdr *ip6 = NULL;
     72       1.3   rmind 	struct tcphdr *oth, *th;
     73       1.1   rmind 	tcp_seq seq, ack;
     74       1.3   rmind 	int tcpdlen, len;
     75       1.3   rmind 	uint32_t win;
     76       1.1   rmind 
     77       1.1   rmind 	/* Fetch relevant data. */
     78       1.5  zoltan 	KASSERT(npf_iscached(npc, NPC_IP46));
     79       1.5  zoltan 	KASSERT(npf_iscached(npc, NPC_LAYER4));
     80       1.8   rmind 	tcpdlen = npf_tcpsaw(npc, &seq, &ack, &win);
     81  1.12.2.1     tls 	oth = npc->npc_l4.tcp;
     82       1.3   rmind 
     83       1.3   rmind 	if (oth->th_flags & TH_RST) {
     84       1.1   rmind 		return 0;
     85       1.1   rmind 	}
     86       1.1   rmind 
     87       1.1   rmind 	/* Create and setup a network buffer. */
     88       1.8   rmind 	if (npf_iscached(npc, NPC_IP4)) {
     89       1.5  zoltan 		len = sizeof(struct ip) + sizeof(struct tcphdr);
     90      1.10   rmind 	} else if (npf_iscached(npc, NPC_IP6)) {
     91      1.10   rmind 		len = sizeof(struct ip6_hdr) + sizeof(struct tcphdr);
     92       1.8   rmind 	} else {
     93      1.10   rmind 		return EINVAL;
     94       1.6  zoltan 	}
     95       1.5  zoltan 
     96       1.1   rmind 	m = m_gethdr(M_DONTWAIT, MT_HEADER);
     97       1.1   rmind 	if (m == NULL) {
     98       1.1   rmind 		return ENOMEM;
     99       1.1   rmind 	}
    100       1.1   rmind 	m->m_data += max_linkhdr;
    101       1.1   rmind 	m->m_len = len;
    102       1.1   rmind 	m->m_pkthdr.len = len;
    103       1.1   rmind 
    104       1.6  zoltan 	if (npf_iscached(npc, NPC_IP4)) {
    105  1.12.2.1     tls 		struct ip *oip = npc->npc_ip.v4;
    106       1.7   rmind 
    107       1.5  zoltan 		ip = mtod(m, struct ip *);
    108       1.5  zoltan 		memset(ip, 0, len);
    109       1.5  zoltan 
    110       1.5  zoltan 		/*
    111      1.11   rmind 		 * First, partially fill IPv4 header for TCP checksum.
    112       1.7   rmind 		 * Note: IP length contains TCP header length.
    113       1.7   rmind 		 */
    114       1.5  zoltan 		ip->ip_p = IPPROTO_TCP;
    115       1.5  zoltan 		ip->ip_src.s_addr = oip->ip_dst.s_addr;
    116       1.5  zoltan 		ip->ip_dst.s_addr = oip->ip_src.s_addr;
    117       1.5  zoltan 		ip->ip_len = htons(sizeof(struct tcphdr));
    118       1.5  zoltan 
    119       1.5  zoltan 		th = (struct tcphdr *)(ip + 1);
    120       1.5  zoltan 	} else {
    121  1.12.2.1     tls 		struct ip6_hdr *oip = npc->npc_ip.v6;
    122       1.7   rmind 
    123       1.6  zoltan 		KASSERT(npf_iscached(npc, NPC_IP6));
    124       1.5  zoltan 		ip6 = mtod(m, struct ip6_hdr *);
    125       1.5  zoltan 		memset(ip6, 0, len);
    126       1.5  zoltan 
    127       1.5  zoltan 		ip6->ip6_nxt = IPPROTO_TCP;
    128       1.5  zoltan 		ip6->ip6_hlim = IPV6_DEFHLIM;
    129       1.5  zoltan 		memcpy(&ip6->ip6_src, &oip->ip6_dst, sizeof(struct in6_addr));
    130       1.7   rmind 		memcpy(&ip6->ip6_dst, &oip->ip6_src, sizeof(struct in6_addr));
    131       1.5  zoltan 		ip6->ip6_plen = htons(len);
    132       1.5  zoltan 		ip6->ip6_vfc = IPV6_VERSION;
    133       1.1   rmind 
    134       1.5  zoltan 		th = (struct tcphdr *)(ip6 + 1);
    135       1.5  zoltan 	}
    136       1.1   rmind 
    137      1.11   rmind 	/*
    138      1.11   rmind 	 * Construct TCP header and compute the checksum.
    139      1.11   rmind 	 */
    140       1.3   rmind 	th->th_sport = oth->th_dport;
    141       1.3   rmind 	th->th_dport = oth->th_sport;
    142       1.1   rmind 	th->th_seq = htonl(ack);
    143       1.3   rmind 	if (oth->th_flags & TH_SYN) {
    144       1.1   rmind 		tcpdlen++;
    145       1.1   rmind 	}
    146       1.1   rmind 	th->th_ack = htonl(seq + tcpdlen);
    147       1.1   rmind 	th->th_off = sizeof(struct tcphdr) >> 2;
    148       1.1   rmind 	th->th_flags = TH_ACK | TH_RST;
    149       1.1   rmind 
    150       1.6  zoltan 	if (npf_iscached(npc, NPC_IP4)) {
    151       1.5  zoltan 		th->th_sum = in_cksum(m, len);
    152       1.5  zoltan 
    153      1.11   rmind 		/*
    154      1.11   rmind 		 * Second, fill the rest of IPv4 header and correct IP length.
    155      1.11   rmind 		 */
    156       1.5  zoltan 		ip->ip_v = IPVERSION;
    157       1.5  zoltan 		ip->ip_hl = sizeof(struct ip) >> 2;
    158       1.5  zoltan 		ip->ip_tos = IPTOS_LOWDELAY;
    159       1.5  zoltan 		ip->ip_len = htons(len);
    160       1.5  zoltan 		ip->ip_ttl = DEFAULT_IP_TTL;
    161       1.5  zoltan 	} else {
    162       1.6  zoltan 		KASSERT(npf_iscached(npc, NPC_IP6));
    163       1.7   rmind 		th->th_sum = in6_cksum(m, IPPROTO_TCP, sizeof(struct ip6_hdr),
    164       1.7   rmind 		    sizeof(struct tcphdr));
    165       1.5  zoltan 	}
    166       1.1   rmind 
    167       1.1   rmind 	/* Pass to IP layer. */
    168       1.8   rmind 	if (npf_iscached(npc, NPC_IP4)) {
    169       1.5  zoltan 		return ip_output(m, NULL, NULL, IP_FORWARDING, NULL, NULL);
    170       1.5  zoltan 	}
    171      1.10   rmind 	return ip6_output(m, NULL, NULL, IPV6_FORWARDING, NULL, NULL, NULL);
    172       1.1   rmind }
    173       1.1   rmind 
    174       1.1   rmind /*
    175       1.1   rmind  * npf_return_icmp: return an ICMP error.
    176       1.1   rmind  */
    177       1.1   rmind static int
    178  1.12.2.2     tls npf_return_icmp(const npf_cache_t *npc)
    179       1.1   rmind {
    180  1.12.2.2     tls 	struct mbuf *m = nbuf_head_mbuf(npc->npc_nbuf);
    181       1.1   rmind 
    182       1.5  zoltan 	if (npf_iscached(npc, NPC_IP4)) {
    183       1.5  zoltan 		icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_ADMIN_PROHIBIT, 0, 0);
    184      1.10   rmind 		return 0;
    185      1.10   rmind 	} else if (npf_iscached(npc, NPC_IP6)) {
    186       1.5  zoltan 		icmp6_error(m, ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_ADMIN, 0);
    187      1.10   rmind 		return 0;
    188       1.5  zoltan 	}
    189      1.10   rmind 	return EINVAL;
    190       1.1   rmind }
    191       1.1   rmind 
    192       1.1   rmind /*
    193       1.1   rmind  * npf_return_block: return TCP reset or ICMP host unreachable packet.
    194      1.10   rmind  *
    195      1.10   rmind  * => Returns true if the buffer was consumed (freed) and false otherwise.
    196       1.1   rmind  */
    197      1.10   rmind bool
    198  1.12.2.2     tls npf_return_block(npf_cache_t *npc, const int retfl)
    199       1.1   rmind {
    200      1.12   rmind 	if (!npf_iscached(npc, NPC_IP46) || !npf_iscached(npc, NPC_LAYER4)) {
    201      1.10   rmind 		return false;
    202       1.1   rmind 	}
    203  1.12.2.1     tls 	switch (npc->npc_proto) {
    204       1.1   rmind 	case IPPROTO_TCP:
    205       1.3   rmind 		if (retfl & NPF_RULE_RETRST) {
    206       1.8   rmind 			(void)npf_return_tcp(npc);
    207       1.3   rmind 		}
    208       1.1   rmind 		break;
    209       1.1   rmind 	case IPPROTO_UDP:
    210      1.10   rmind 		if (retfl & NPF_RULE_RETICMP)
    211  1.12.2.2     tls 			if (npf_return_icmp(npc) == 0)
    212      1.10   rmind 				return true;
    213       1.1   rmind 		break;
    214       1.1   rmind 	}
    215      1.10   rmind 	return false;
    216       1.1   rmind }
    217