1/*- 2 * Copyright (c) 2014-2020 Mindaugas Rasiukevicius <rmind at netbsd org> 3 * Copyright (c) 2010-2014 The NetBSD Foundation, Inc. 4 * All rights reserved. 5 * 6 * This material is based upon work partially supported by The 7 * NetBSD Foundation under a contract with Mindaugas Rasiukevicius. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 19 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 20 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 21 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 22 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28 * POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31/* 32 * Connection key -- is an n-tuple structure encoding the address length, 33 * layer 3 protocol, source and destination addresses and ports (or other 34 * protocol IDs) and some configurable elements (see below). 35 * 36 * Key layout 37 * 38 * The single key is formed out of 32-bit integers. The layout is 39 * as follows (first row -- fields, second row -- number of bits): 40 * 41 * | alen | proto | ckey | src-id | dst-id | src-addr | dst-addr | 42 * +------+-------+--------+--------+--------+----------+----------+ 43 * | 4 | 8 | 20 | 16 | 16 | 32-128 | 32-128 | 44 * 45 * The source and destination are inverted if the key is for the 46 * backwards stream (NPF_FLOW_BACK). The address length depends on 47 * the 'alen' field. The length is in words and is either 1 or 4, 48 * meaning 4 or 16 in bytes. 49 * 50 * The 20-bit configurable key area ('ckey') is for the optional 51 * elements which may be included or excluded by the user. It has 52 * the following layout: 53 * 54 * | direction | interface-id | 55 * +-----------+--------------+ 56 * | 2 | 18 | 57 * 58 * Note: neither direction nor interface ID cannot be zero; we rely 59 * on this by reserving the zero 'ckey' value to for the case when 60 * these checks are not applicable. 61 * 62 * Embedding in the connection structure (npf_conn_t) 63 * 64 * Two keys are stored in the npf_conn_t::c_keys[] array, which is 65 * variable-length, depending on whether the keys store IPv4 or IPv6 66 * addresses. The length of the first key determines the position 67 * of the second key. 68 * 69 * WARNING: the keys must be immutable while they are in conndb. 70 */ 71 72#ifdef _KERNEL 73#include <sys/cdefs.h> 74__KERNEL_RCSID(0, "$NetBSD: npf_connkey.c,v 1.2 2020/05/30 14:16:56 rmind Exp $"); 75 76#include <sys/param.h> 77#include <sys/types.h> 78#endif 79 80#define __NPF_CONN_PRIVATE 81#include "npf_conn.h" 82#include "npf_impl.h" 83 84unsigned 85npf_connkey_setkey(npf_connkey_t *key, unsigned alen, unsigned proto, 86 const void *ipv, const uint16_t *id, const npf_flow_t flow) 87{ 88 const npf_addr_t * const *ips = ipv; 89 uint32_t *k = key->ck_key; 90 unsigned isrc, idst; 91 92 if (__predict_true(flow == NPF_FLOW_FORW)) { 93 isrc = NPF_SRC, idst = NPF_DST; 94 } else { 95 isrc = NPF_DST, idst = NPF_SRC; 96 } 97 98 /* 99 * See the key layout explanation above. 100 */ 101 KASSERT((alen >> 2) <= 0xf && proto <= 0xff); 102 k[0] = ((uint32_t)(alen >> 2) << 28) | (proto << 20); 103 k[1] = ((uint32_t)id[isrc] << 16) | id[idst]; 104 105 if (__predict_true(alen == sizeof(in_addr_t))) { 106 k[2] = ips[isrc]->word32[0]; 107 k[3] = ips[idst]->word32[0]; 108 return 4 * sizeof(uint32_t); 109 } else { 110 const unsigned nwords = alen >> 2; 111 memcpy(&k[2], ips[isrc], alen); 112 memcpy(&k[2 + nwords], ips[idst], alen); 113 return (2 + (nwords * 2)) * sizeof(uint32_t); 114 } 115} 116 117void 118npf_connkey_getkey(const npf_connkey_t *key, unsigned *alen, unsigned *proto, 119 npf_addr_t *ips, uint16_t *id) 120{ 121 const uint32_t *k = key->ck_key; 122 123 /* 124 * See the key layout explanation above. 125 */ 126 127 *alen = (k[0] >> 28) << 2; 128 *proto = (k[0] >> 16) & 0xff; 129 id[NPF_SRC] = k[1] >> 16; 130 id[NPF_DST] = k[1] & 0xffff; 131 132 switch (*alen) { 133 case sizeof(struct in6_addr): 134 case sizeof(struct in_addr): 135 memcpy(&ips[NPF_SRC], &k[2], *alen); 136 memcpy(&ips[NPF_DST], &k[2 + ((unsigned)*alen >> 2)], *alen); 137 return; 138 default: 139 KASSERT(0); 140 } 141} 142 143static inline void 144npf_connkey_setckey(npf_connkey_t *key, unsigned ifid, unsigned di) 145{ 146 if (ifid) { 147 /* 148 * Interface ID: the lower 18 bits of the 20-bit 'ckey'. 149 * Note: the interface ID cannot be zero. 150 */ 151 CTASSERT(NPF_MAX_IFMAP < (1U << 18)); 152 key->ck_key[0] |= ifid; 153 } 154 if (di) { 155 /* 156 * Direction: The highest 2 bits of the 20-bit 'ckey'. 157 * Note: we rely on PFIL_IN and PFIL_OUT definitions. 158 */ 159 CTASSERT(PFIL_IN == 0x1 || PFIL_OUT == 0x2); 160 KASSERT((di & ~PFIL_ALL) == 0); 161 key->ck_key[0] |= ((uint32_t)di << 18); 162 } 163} 164 165static void 166npf_connkey_getckey(const npf_connkey_t *key, unsigned *ifid, unsigned *di) 167{ 168 const uint32_t * const k = key->ck_key; 169 170 *ifid = k[0] & ((1U << 20) - 1); 171 *di = (k[0] >> 18) & PFIL_ALL; 172} 173 174/* 175 * npf_conn_adjkey: adjust the connection key by setting the address/port. 176 * 177 * => The 'which' must either be NPF_SRC or NPF_DST. 178 */ 179void 180npf_conn_adjkey(npf_connkey_t *key, const npf_addr_t *naddr, 181 const uint16_t id, const unsigned which) 182{ 183 const unsigned alen = NPF_CONNKEY_ALEN(key); 184 uint32_t * const k = key->ck_key; 185 uint32_t *addr = &k[2 + ((alen >> 2) * which)]; 186 187 KASSERT(which == NPF_SRC || which == NPF_DST); 188 KASSERT(alen > 0); 189 memcpy(addr, naddr, alen); 190 191 if (id) { 192 const uint32_t oid = k[1]; 193 const unsigned shift = 16 * !which; 194 const uint32_t mask = 0xffff0000 >> shift; 195 k[1] = ((uint32_t)id << shift) | (oid & mask); 196 } 197} 198 199static unsigned 200npf_connkey_copy(const npf_connkey_t *skey, npf_connkey_t *dkey, bool invert) 201{ 202 const unsigned klen = NPF_CONNKEY_LEN(skey); 203 const uint32_t *sk = skey->ck_key; 204 uint32_t *dk = dkey->ck_key; 205 206 if (invert) { 207 const unsigned alen = NPF_CONNKEY_ALEN(skey); 208 const unsigned nwords = alen >> 2; 209 210 dk[0] = sk[1]; 211 dk[1] = (sk[1] >> 16) | (sk[1] << 16); 212 memcpy(&dk[2], &sk[2 + nwords], alen); 213 memcpy(&dk[2 + nwords], &sk[2], alen); 214 } else { 215 memcpy(dk, sk, klen); 216 } 217 return klen; 218} 219 220/* 221 * npf_conn_conkey: construct a key for the connection lookup. 222 * 223 * => Returns the key length in bytes or zero on failure. 224 */ 225unsigned 226npf_conn_conkey(const npf_cache_t *npc, npf_connkey_t *key, 227 const unsigned di, const npf_flow_t flow) 228{ 229 const npf_conn_params_t *params = npc->npc_ctx->params[NPF_PARAMS_CONN]; 230 const nbuf_t *nbuf = npc->npc_nbuf; 231 const unsigned proto = npc->npc_proto; 232 const unsigned alen = npc->npc_alen; 233 const struct tcphdr *th; 234 const struct udphdr *uh; 235 uint16_t id[2] = { 0, 0 }; 236 unsigned ret; 237 238 if (npc->npc_ckey) { 239 /* 240 * Request to override the connection key. 241 */ 242 const bool invert = flow != NPF_FLOW_FORW; 243 return npf_connkey_copy(npc->npc_ckey, key, invert); 244 } 245 246 switch (proto) { 247 case IPPROTO_TCP: 248 KASSERT(npf_iscached(npc, NPC_TCP)); 249 th = npc->npc_l4.tcp; 250 id[NPF_SRC] = th->th_sport; 251 id[NPF_DST] = th->th_dport; 252 break; 253 case IPPROTO_UDP: 254 KASSERT(npf_iscached(npc, NPC_UDP)); 255 uh = npc->npc_l4.udp; 256 id[NPF_SRC] = uh->uh_sport; 257 id[NPF_DST] = uh->uh_dport; 258 break; 259 case IPPROTO_ICMP: 260 if (npf_iscached(npc, NPC_ICMP_ID)) { 261 const struct icmp *ic = npc->npc_l4.icmp; 262 id[NPF_SRC] = ic->icmp_id; 263 id[NPF_DST] = ic->icmp_id; 264 break; 265 } 266 return 0; 267 case IPPROTO_ICMPV6: 268 if (npf_iscached(npc, NPC_ICMP_ID)) { 269 const struct icmp6_hdr *ic6 = npc->npc_l4.icmp6; 270 id[NPF_SRC] = ic6->icmp6_id; 271 id[NPF_DST] = ic6->icmp6_id; 272 break; 273 } 274 return 0; 275 default: 276 /* Unsupported protocol. */ 277 return 0; 278 } 279 280 ret = npf_connkey_setkey(key, alen, proto, npc->npc_ips, id, flow); 281 npf_connkey_setckey(key, 282 params->connkey_interface ? nbuf->nb_ifid : 0, 283 params->connkey_direction ? (di & PFIL_ALL) : 0); 284 return ret; 285} 286 287/* 288 * npf_conn_getforwkey: get the address to the "forwards" key. 289 */ 290npf_connkey_t * 291npf_conn_getforwkey(npf_conn_t *conn) 292{ 293 return (void *)&conn->c_keys[0]; 294} 295 296/* 297 * npf_conn_getbackkey: get the address to the "backwards" key. 298 * 299 * => It depends on the address length. 300 */ 301npf_connkey_t * 302npf_conn_getbackkey(npf_conn_t *conn, unsigned alen) 303{ 304 const unsigned off = 2 + ((alen * 2) >> 2); 305 KASSERT(off == NPF_CONNKEY_V4WORDS || off == NPF_CONNKEY_V6WORDS); 306 return (void *)&conn->c_keys[off]; 307} 308 309/* 310 * Connection key exporting/importing. 311 */ 312 313nvlist_t * 314npf_connkey_export(npf_t *npf, const npf_connkey_t *key) 315{ 316 unsigned alen, proto, ifid, di; 317 npf_addr_t ips[2]; 318 uint16_t ids[2]; 319 nvlist_t *key_nv; 320 321 key_nv = nvlist_create(0); 322 323 npf_connkey_getkey(key, &alen, &proto, ips, ids); 324 nvlist_add_number(key_nv, "proto", proto); 325 nvlist_add_number(key_nv, "sport", ids[NPF_SRC]); 326 nvlist_add_number(key_nv, "dport", ids[NPF_DST]); 327 nvlist_add_binary(key_nv, "saddr", &ips[NPF_SRC], alen); 328 nvlist_add_binary(key_nv, "daddr", &ips[NPF_DST], alen); 329 330 npf_connkey_getckey(key, &ifid, &di); 331 if (ifid) { 332 char ifname[IFNAMSIZ]; 333 npf_ifmap_copyname(npf, ifid, ifname, sizeof(ifname)); 334 nvlist_add_string(key_nv, "ifname", ifname); 335 } 336 if (di) { 337 nvlist_add_number(key_nv, "di", di); 338 } 339 340 return key_nv; 341} 342 343unsigned 344npf_connkey_import(npf_t *npf, const nvlist_t *key_nv, npf_connkey_t *key) 345{ 346 npf_addr_t const * ips[2]; 347 size_t alen1, alen2, proto; 348 unsigned ret, di, ifid = 0; 349 const char *ifname; 350 uint16_t ids[2]; 351 352 proto = dnvlist_get_number(key_nv, "proto", 0); 353 if (proto >= IPPROTO_MAX) { 354 return 0; 355 } 356 ids[NPF_SRC] = dnvlist_get_number(key_nv, "sport", 0); 357 ids[NPF_DST] = dnvlist_get_number(key_nv, "dport", 0); 358 ips[NPF_SRC] = dnvlist_get_binary(key_nv, "saddr", &alen1, NULL, 0); 359 ips[NPF_DST] = dnvlist_get_binary(key_nv, "daddr", &alen2, NULL, 0); 360 if (alen1 == 0 || alen1 > sizeof(npf_addr_t) || alen1 != alen2) { 361 return 0; 362 } 363 ret = npf_connkey_setkey(key, alen1, proto, ips, ids, NPF_FLOW_FORW); 364 if (ret == 0) { 365 return 0; 366 } 367 368 ifname = dnvlist_get_string(key_nv, "ifname", NULL); 369 if (ifname && (ifid = npf_ifmap_register(npf, ifname)) == 0) { 370 return 0; 371 } 372 di = dnvlist_get_number(key_nv, "di", 0) & PFIL_ALL; 373 npf_connkey_setckey(key, ifid, di); 374 375 return ret; 376} 377 378#if defined(DDB) || defined(_NPF_TESTING) 379 380void 381npf_connkey_print(const npf_connkey_t *key) 382{ 383 unsigned alen, proto, ifid, di; 384 npf_addr_t ips[2]; 385 uint16_t ids[2]; 386 387 npf_connkey_getkey(key, &alen, &proto, ips, ids); 388 npf_connkey_getckey(key, &ifid, &di); 389 printf("\tkey (ifid %u, di %x)\t", ifid, di); 390 printf("%s:%u", npf_addr_dump(&ips[0], alen), ids[0]); 391 printf("-> %s:%u\n", npf_addr_dump(&ips[1], alen), ids[1]); 392} 393 394#endif 395