12393Syz155240 /* 22393Syz155240 * Copyright (C) 1995-2003 by Darren Reed. 32393Syz155240 * 42393Syz155240 * See the IPFILTER.LICENCE file for details on licencing. 52393Syz155240 * 63448Sdh155122 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 72393Syz155240 * Use is subject to license terms. 82393Syz155240 */ 92393Syz155240 102393Syz155240 #pragma ident "%Z%%M% %I% %E% SMI" 112393Syz155240 122393Syz155240 #if defined(KERNEL) || defined(_KERNEL) 132393Syz155240 # undef KERNEL 142393Syz155240 # undef _KERNEL 152393Syz155240 # define KERNEL 1 162393Syz155240 # define _KERNEL 1 172393Syz155240 #endif 182393Syz155240 #include <sys/errno.h> 192393Syz155240 #include <sys/types.h> 202393Syz155240 #include <sys/param.h> 212393Syz155240 #include <sys/file.h> 222393Syz155240 #if defined(__NetBSD__) && (NetBSD >= 199905) && !defined(IPFILTER_LKM) && \ 232393Syz155240 defined(_KERNEL) 242393Syz155240 # include "opt_ipfilter_log.h" 252393Syz155240 #endif 262393Syz155240 #if defined(_KERNEL) && defined(__FreeBSD_version) && \ 272393Syz155240 (__FreeBSD_version >= 400000) && !defined(KLD_MODULE) 282393Syz155240 #include "opt_inet6.h" 292393Syz155240 #endif 302393Syz155240 #if !defined(_KERNEL) && !defined(__KERNEL__) 312393Syz155240 # include <stdio.h> 322393Syz155240 # include <stdlib.h> 332393Syz155240 # include <string.h> 342393Syz155240 # define _KERNEL 352393Syz155240 # ifdef __OpenBSD__ 362393Syz155240 struct file; 372393Syz155240 # endif 382393Syz155240 # include <sys/uio.h> 392393Syz155240 # undef _KERNEL 402393Syz155240 #endif 412393Syz155240 #if defined(_KERNEL) && (__FreeBSD_version >= 220000) 422393Syz155240 # include <sys/filio.h> 432393Syz155240 # include <sys/fcntl.h> 442393Syz155240 # if (__FreeBSD_version >= 300000) && !defined(IPFILTER_LKM) 452393Syz155240 # include "opt_ipfilter.h" 462393Syz155240 # endif 472393Syz155240 #else 482393Syz155240 # include <sys/ioctl.h> 492393Syz155240 #endif 502393Syz155240 #include <sys/time.h> 512393Syz155240 #if !defined(linux) 522393Syz155240 # include <sys/protosw.h> 532393Syz155240 #endif 542393Syz155240 #include <sys/socket.h> 552393Syz155240 #if defined(_KERNEL) 562393Syz155240 # include <sys/systm.h> 572393Syz155240 # if !defined(__SVR4) && !defined(__svr4__) 582393Syz155240 # include <sys/mbuf.h> 592393Syz155240 # endif 602393Syz155240 #endif 612393Syz155240 #if defined(__SVR4) || defined(__svr4__) 622393Syz155240 # include <sys/filio.h> 632393Syz155240 # include <sys/byteorder.h> 642393Syz155240 # ifdef _KERNEL 652393Syz155240 # include <sys/dditypes.h> 662393Syz155240 # endif 672393Syz155240 # include <sys/stream.h> 682393Syz155240 # include <sys/kmem.h> 692393Syz155240 #endif 702393Syz155240 712393Syz155240 #include <net/if.h> 722393Syz155240 #ifdef sun 732393Syz155240 # include <net/af.h> 742393Syz155240 #endif 752393Syz155240 #include <net/route.h> 762393Syz155240 #include <netinet/in.h> 772393Syz155240 #include <netinet/in_systm.h> 782393Syz155240 #include <netinet/ip.h> 792393Syz155240 #include <netinet/tcp.h> 802393Syz155240 #if !defined(linux) 812393Syz155240 # include <netinet/ip_var.h> 822393Syz155240 #endif 832393Syz155240 #if !defined(__hpux) && !defined(linux) 842393Syz155240 # include <netinet/tcp_fsm.h> 852393Syz155240 #endif 862393Syz155240 #include <netinet/udp.h> 872393Syz155240 #include <netinet/ip_icmp.h> 882393Syz155240 #include "netinet/ip_compat.h" 892393Syz155240 #include <netinet/tcpip.h> 902393Syz155240 #include "netinet/ip_fil.h" 912393Syz155240 #include "netinet/ip_nat.h" 922393Syz155240 #include "netinet/ip_frag.h" 932393Syz155240 #include "netinet/ip_state.h" 942393Syz155240 #include "netinet/ip_proxy.h" 953448Sdh155122 #include "netinet/ipf_stack.h" 962393Syz155240 #ifdef IPFILTER_SYNC 972393Syz155240 #include "netinet/ip_sync.h" 982393Syz155240 #endif 992393Syz155240 #ifdef IPFILTER_SCAN 1002393Syz155240 #include "netinet/ip_scan.h" 1012393Syz155240 #endif 1022393Syz155240 #ifdef USE_INET6 1032393Syz155240 #include <netinet/icmp6.h> 1042393Syz155240 #endif 1052393Syz155240 #if (__FreeBSD_version >= 300000) 1062393Syz155240 # include <sys/malloc.h> 1072393Syz155240 # if defined(_KERNEL) && !defined(IPFILTER_LKM) 1082393Syz155240 # include <sys/libkern.h> 1092393Syz155240 # include <sys/systm.h> 1102393Syz155240 # endif 1112393Syz155240 #endif 1122393Syz155240 /* END OF INCLUDES */ 1132393Syz155240 1142393Syz155240 1152393Syz155240 #if !defined(lint) 1162393Syz155240 static const char sccsid[] = "@(#)ip_state.c 1.8 6/5/96 (C) 1993-2000 Darren Reed"; 1172393Syz155240 static const char rcsid[] = "@(#)$Id: ip_state.c,v 2.186.2.36 2005/08/11 19:58:03 darrenr Exp $"; 1182393Syz155240 #endif 1192393Syz155240 1202393Syz155240 #ifdef USE_INET6 1212393Syz155240 static ipstate_t *fr_checkicmp6matchingstate __P((fr_info_t *)); 1222393Syz155240 #endif 1232393Syz155240 static ipstate_t *fr_matchsrcdst __P((fr_info_t *, ipstate_t *, i6addr_t *, 1242393Syz155240 i6addr_t *, tcphdr_t *, u_32_t)); 1252393Syz155240 static ipstate_t *fr_checkicmpmatchingstate __P((fr_info_t *)); 1263448Sdh155122 static int fr_state_flush __P((int, int, ipf_stack_t *)); 1273448Sdh155122 static ips_stat_t *fr_statetstats __P((ipf_stack_t *)); 1283448Sdh155122 static void fr_delstate __P((ipstate_t *, int, ipf_stack_t *)); 1293448Sdh155122 static int fr_state_remove __P((caddr_t, ipf_stack_t *)); 1303448Sdh155122 static void fr_ipsmove __P((ipstate_t *, u_int, ipf_stack_t *)); 1312393Syz155240 static int fr_tcpstate __P((fr_info_t *, tcphdr_t *, ipstate_t *)); 1322393Syz155240 static int fr_tcpoptions __P((fr_info_t *, tcphdr_t *, tcpdata_t *)); 1332393Syz155240 static ipstate_t *fr_stclone __P((fr_info_t *, tcphdr_t *, ipstate_t *)); 1342393Syz155240 static void fr_fixinisn __P((fr_info_t *, ipstate_t *)); 1352393Syz155240 static void fr_fixoutisn __P((fr_info_t *, ipstate_t *)); 1362393Syz155240 static void fr_checknewisn __P((fr_info_t *, ipstate_t *)); 1373448Sdh155122 static int fr_stateiter __P((ipftoken_t *, ipfgeniter_t *, ipf_stack_t *)); 1383448Sdh155122 1393448Sdh155122 int fr_stputent __P((caddr_t, ipf_stack_t *)); 1403448Sdh155122 int fr_stgetent __P((caddr_t, ipf_stack_t *)); 1412393Syz155240 1422393Syz155240 #define ONE_DAY IPF_TTLVAL(1 * 86400) /* 1 day */ 1432393Syz155240 #define FIVE_DAYS (5 * ONE_DAY) 1443448Sdh155122 #define DOUBLE_HASH(x, ifs) \ 1453448Sdh155122 (((x) + ifs->ifs_ips_seed[(x) % ifs->ifs_fr_statesize]) % ifs->ifs_fr_statesize) 1463448Sdh155122 1472393Syz155240 1482393Syz155240 1492393Syz155240 /* ------------------------------------------------------------------------ */ 1502393Syz155240 /* Function: fr_stateinit */ 1512393Syz155240 /* Returns: int - 0 == success, -1 == failure */ 1522393Syz155240 /* Parameters: Nil */ 1532393Syz155240 /* */ 1542393Syz155240 /* Initialise all the global variables used within the state code. */ 1552393Syz155240 /* This action also includes initiailising locks. */ 1562393Syz155240 /* ------------------------------------------------------------------------ */ 1573448Sdh155122 int fr_stateinit(ifs) 1583448Sdh155122 ipf_stack_t *ifs; 1592393Syz155240 { 1602393Syz155240 int i; 1612393Syz155240 1623448Sdh155122 KMALLOCS(ifs->ifs_ips_table, ipstate_t **, 1633448Sdh155122 ifs->ifs_fr_statesize * sizeof(ipstate_t *)); 1643448Sdh155122 if (ifs->ifs_ips_table == NULL) 1652393Syz155240 return -1; 1663448Sdh155122 bzero((char *)ifs->ifs_ips_table, 1673448Sdh155122 ifs->ifs_fr_statesize * sizeof(ipstate_t *)); 1683448Sdh155122 1693448Sdh155122 KMALLOCS(ifs->ifs_ips_seed, u_long *, 1703448Sdh155122 ifs->ifs_fr_statesize * sizeof(*ifs->ifs_ips_seed)); 1713448Sdh155122 if (ifs->ifs_ips_seed == NULL) 1722393Syz155240 return -2; 1733448Sdh155122 for (i = 0; i < ifs->ifs_fr_statesize; i++) { 1742393Syz155240 /* 1752393Syz155240 * XXX - ips_seed[X] should be a random number of sorts. 1762393Syz155240 */ 1772393Syz155240 #if (__FreeBSD_version >= 400000) 1783448Sdh155122 ifs->ifs_ips_seed[i] = arc4random(); 1792393Syz155240 #else 1803448Sdh155122 ifs->ifs_ips_seed[i] = ((u_long)ifs->ifs_ips_seed + i) * 1813448Sdh155122 ifs->ifs_fr_statesize; 1823448Sdh155122 ifs->ifs_ips_seed[i] ^= 0xa5a55a5a; 1833448Sdh155122 ifs->ifs_ips_seed[i] *= (u_long)ifs->ifs_ips_seed; 1843448Sdh155122 ifs->ifs_ips_seed[i] ^= 0x5a5aa5a5; 1853448Sdh155122 ifs->ifs_ips_seed[i] *= ifs->ifs_fr_statemax; 1862393Syz155240 #endif 1872393Syz155240 } 1882393Syz155240 1892393Syz155240 /* fill icmp reply type table */ 1902393Syz155240 for (i = 0; i <= ICMP_MAXTYPE; i++) 1912393Syz155240 icmpreplytype4[i] = -1; 1922393Syz155240 icmpreplytype4[ICMP_ECHO] = ICMP_ECHOREPLY; 1932393Syz155240 icmpreplytype4[ICMP_TSTAMP] = ICMP_TSTAMPREPLY; 1942393Syz155240 icmpreplytype4[ICMP_IREQ] = ICMP_IREQREPLY; 1952393Syz155240 icmpreplytype4[ICMP_MASKREQ] = ICMP_MASKREPLY; 1962393Syz155240 #ifdef USE_INET6 1972393Syz155240 /* fill icmp reply type table */ 1982393Syz155240 for (i = 0; i <= ICMP6_MAXTYPE; i++) 1992393Syz155240 icmpreplytype6[i] = -1; 2002393Syz155240 icmpreplytype6[ICMP6_ECHO_REQUEST] = ICMP6_ECHO_REPLY; 2012393Syz155240 icmpreplytype6[ICMP6_MEMBERSHIP_QUERY] = ICMP6_MEMBERSHIP_REPORT; 2022393Syz155240 icmpreplytype6[ICMP6_NI_QUERY] = ICMP6_NI_REPLY; 2032393Syz155240 icmpreplytype6[ND_ROUTER_SOLICIT] = ND_ROUTER_ADVERT; 2042393Syz155240 icmpreplytype6[ND_NEIGHBOR_SOLICIT] = ND_NEIGHBOR_ADVERT; 2052393Syz155240 #endif 2062393Syz155240 2073448Sdh155122 KMALLOCS(ifs->ifs_ips_stats.iss_bucketlen, u_long *, 2083448Sdh155122 ifs->ifs_fr_statesize * sizeof(u_long)); 2093448Sdh155122 if (ifs->ifs_ips_stats.iss_bucketlen == NULL) 2102393Syz155240 return -1; 2113448Sdh155122 bzero((char *)ifs->ifs_ips_stats.iss_bucketlen, 2123448Sdh155122 ifs->ifs_fr_statesize * sizeof(u_long)); 2133448Sdh155122 2143448Sdh155122 if (ifs->ifs_fr_state_maxbucket == 0) { 2153448Sdh155122 for (i = ifs->ifs_fr_statesize; i > 0; i >>= 1) 2163448Sdh155122 ifs->ifs_fr_state_maxbucket++; 2173448Sdh155122 ifs->ifs_fr_state_maxbucket *= 2; 2182393Syz155240 } 2192393Syz155240 2203448Sdh155122 fr_sttab_init(ifs->ifs_ips_tqtqb, ifs); 2213448Sdh155122 ifs->ifs_ips_tqtqb[IPF_TCP_NSTATES - 1].ifq_next = &ifs->ifs_ips_udptq; 2223448Sdh155122 ifs->ifs_ips_udptq.ifq_ttl = (u_long)ifs->ifs_fr_udptimeout; 2233448Sdh155122 ifs->ifs_ips_udptq.ifq_ref = 1; 2243448Sdh155122 ifs->ifs_ips_udptq.ifq_head = NULL; 2253448Sdh155122 ifs->ifs_ips_udptq.ifq_tail = &ifs->ifs_ips_udptq.ifq_head; 2263448Sdh155122 MUTEX_INIT(&ifs->ifs_ips_udptq.ifq_lock, "ipftq udp tab"); 2273448Sdh155122 ifs->ifs_ips_udptq.ifq_next = &ifs->ifs_ips_udpacktq; 2283448Sdh155122 ifs->ifs_ips_udpacktq.ifq_ttl = (u_long)ifs->ifs_fr_udpacktimeout; 2293448Sdh155122 ifs->ifs_ips_udpacktq.ifq_ref = 1; 2303448Sdh155122 ifs->ifs_ips_udpacktq.ifq_head = NULL; 2313448Sdh155122 ifs->ifs_ips_udpacktq.ifq_tail = &ifs->ifs_ips_udpacktq.ifq_head; 2323448Sdh155122 MUTEX_INIT(&ifs->ifs_ips_udpacktq.ifq_lock, "ipftq udpack tab"); 2333448Sdh155122 ifs->ifs_ips_udpacktq.ifq_next = &ifs->ifs_ips_icmptq; 2343448Sdh155122 ifs->ifs_ips_icmptq.ifq_ttl = (u_long)ifs->ifs_fr_icmptimeout; 2353448Sdh155122 ifs->ifs_ips_icmptq.ifq_ref = 1; 2363448Sdh155122 ifs->ifs_ips_icmptq.ifq_head = NULL; 2373448Sdh155122 ifs->ifs_ips_icmptq.ifq_tail = &ifs->ifs_ips_icmptq.ifq_head; 2383448Sdh155122 MUTEX_INIT(&ifs->ifs_ips_icmptq.ifq_lock, "ipftq icmp tab"); 2393448Sdh155122 ifs->ifs_ips_icmptq.ifq_next = &ifs->ifs_ips_icmpacktq; 2403448Sdh155122 ifs->ifs_ips_icmpacktq.ifq_ttl = (u_long)ifs->ifs_fr_icmpacktimeout; 2413448Sdh155122 ifs->ifs_ips_icmpacktq.ifq_ref = 1; 2423448Sdh155122 ifs->ifs_ips_icmpacktq.ifq_head = NULL; 2433448Sdh155122 ifs->ifs_ips_icmpacktq.ifq_tail = &ifs->ifs_ips_icmpacktq.ifq_head; 2443448Sdh155122 MUTEX_INIT(&ifs->ifs_ips_icmpacktq.ifq_lock, "ipftq icmpack tab"); 2453448Sdh155122 ifs->ifs_ips_icmpacktq.ifq_next = &ifs->ifs_ips_iptq; 2463448Sdh155122 ifs->ifs_ips_iptq.ifq_ttl = (u_long)ifs->ifs_fr_iptimeout; 2473448Sdh155122 ifs->ifs_ips_iptq.ifq_ref = 1; 2483448Sdh155122 ifs->ifs_ips_iptq.ifq_head = NULL; 2493448Sdh155122 ifs->ifs_ips_iptq.ifq_tail = &ifs->ifs_ips_iptq.ifq_head; 2503448Sdh155122 MUTEX_INIT(&ifs->ifs_ips_iptq.ifq_lock, "ipftq ip tab"); 251*4431San207044 ifs->ifs_ips_iptq.ifq_next = &ifs->ifs_ips_deletetq; 252*4431San207044 /* entry's ttl in deletetq is just 1 tick */ 253*4431San207044 ifs->ifs_ips_deletetq.ifq_ttl = (u_long) 1; 254*4431San207044 ifs->ifs_ips_deletetq.ifq_ref = 1; 255*4431San207044 ifs->ifs_ips_deletetq.ifq_head = NULL; 256*4431San207044 ifs->ifs_ips_deletetq.ifq_tail = &ifs->ifs_ips_deletetq.ifq_head; 257*4431San207044 MUTEX_INIT(&ifs->ifs_ips_deletetq.ifq_lock, "state delete queue"); 258*4431San207044 ifs->ifs_ips_deletetq.ifq_next = NULL; 2593448Sdh155122 2603448Sdh155122 RWLOCK_INIT(&ifs->ifs_ipf_state, "ipf IP state rwlock"); 2613448Sdh155122 MUTEX_INIT(&ifs->ifs_ipf_stinsert, "ipf state insert mutex"); 2623448Sdh155122 ifs->ifs_fr_state_init = 1; 2633448Sdh155122 2643448Sdh155122 ifs->ifs_ips_last_force_flush = ifs->ifs_fr_ticks; 2652393Syz155240 return 0; 2662393Syz155240 } 2672393Syz155240 2682393Syz155240 2692393Syz155240 /* ------------------------------------------------------------------------ */ 2702393Syz155240 /* Function: fr_stateunload */ 2712393Syz155240 /* Returns: Nil */ 2722393Syz155240 /* Parameters: Nil */ 2732393Syz155240 /* */ 2742393Syz155240 /* Release and destroy any resources acquired or initialised so that */ 2752393Syz155240 /* IPFilter can be unloaded or re-initialised. */ 2762393Syz155240 /* ------------------------------------------------------------------------ */ 2773448Sdh155122 void fr_stateunload(ifs) 2783448Sdh155122 ipf_stack_t *ifs; 2792393Syz155240 { 2802393Syz155240 ipftq_t *ifq, *ifqnext; 2812393Syz155240 ipstate_t *is; 2822393Syz155240 2833448Sdh155122 while ((is = ifs->ifs_ips_list) != NULL) 2843448Sdh155122 fr_delstate(is, 0, ifs); 2852393Syz155240 2862393Syz155240 /* 2872393Syz155240 * Proxy timeout queues are not cleaned here because although they 2882393Syz155240 * exist on the state list, appr_unload is called after fr_stateunload 2892393Syz155240 * and the proxies actually are responsible for them being created. 2902393Syz155240 * Should the proxy timeouts have their own list? There's no real 2912393Syz155240 * justification as this is the only complicationA 2922393Syz155240 */ 2933448Sdh155122 for (ifq = ifs->ifs_ips_utqe; ifq != NULL; ifq = ifqnext) { 2942393Syz155240 ifqnext = ifq->ifq_next; 2952393Syz155240 if (((ifq->ifq_flags & IFQF_PROXY) == 0) && 2962393Syz155240 (fr_deletetimeoutqueue(ifq) == 0)) 2973448Sdh155122 fr_freetimeoutqueue(ifq, ifs); 2982393Syz155240 } 2992393Syz155240 3003448Sdh155122 ifs->ifs_ips_stats.iss_inuse = 0; 3013448Sdh155122 ifs->ifs_ips_num = 0; 3023448Sdh155122 3033448Sdh155122 if (ifs->ifs_fr_state_init == 1) { 3043448Sdh155122 fr_sttab_destroy(ifs->ifs_ips_tqtqb); 3053448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ips_udptq.ifq_lock); 3063448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ips_icmptq.ifq_lock); 3073448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ips_udpacktq.ifq_lock); 3083448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ips_icmpacktq.ifq_lock); 3093448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ips_iptq.ifq_lock); 310*4431San207044 MUTEX_DESTROY(&ifs->ifs_ips_deletetq.ifq_lock); 3112393Syz155240 } 3122393Syz155240 3133448Sdh155122 if (ifs->ifs_ips_table != NULL) { 3143448Sdh155122 KFREES(ifs->ifs_ips_table, 3153448Sdh155122 ifs->ifs_fr_statesize * sizeof(*ifs->ifs_ips_table)); 3163448Sdh155122 ifs->ifs_ips_table = NULL; 3172393Syz155240 } 3182393Syz155240 3193448Sdh155122 if (ifs->ifs_ips_seed != NULL) { 3203448Sdh155122 KFREES(ifs->ifs_ips_seed, 3213448Sdh155122 ifs->ifs_fr_statesize * sizeof(*ifs->ifs_ips_seed)); 3223448Sdh155122 ifs->ifs_ips_seed = NULL; 3232393Syz155240 } 3242393Syz155240 3253448Sdh155122 if (ifs->ifs_ips_stats.iss_bucketlen != NULL) { 3263448Sdh155122 KFREES(ifs->ifs_ips_stats.iss_bucketlen, 3273448Sdh155122 ifs->ifs_fr_statesize * sizeof(u_long)); 3283448Sdh155122 ifs->ifs_ips_stats.iss_bucketlen = NULL; 3293448Sdh155122 } 3303448Sdh155122 3313448Sdh155122 if (ifs->ifs_fr_state_maxbucket_reset == 1) 3323448Sdh155122 ifs->ifs_fr_state_maxbucket = 0; 3333448Sdh155122 3343448Sdh155122 if (ifs->ifs_fr_state_init == 1) { 3353448Sdh155122 ifs->ifs_fr_state_init = 0; 3363448Sdh155122 RW_DESTROY(&ifs->ifs_ipf_state); 3373448Sdh155122 MUTEX_DESTROY(&ifs->ifs_ipf_stinsert); 3382393Syz155240 } 3392393Syz155240 } 3402393Syz155240 3412393Syz155240 3422393Syz155240 /* ------------------------------------------------------------------------ */ 3432393Syz155240 /* Function: fr_statetstats */ 3442393Syz155240 /* Returns: ips_state_t* - pointer to state stats structure */ 3452393Syz155240 /* Parameters: Nil */ 3462393Syz155240 /* */ 3472393Syz155240 /* Put all the current numbers and pointers into a single struct and return */ 3482393Syz155240 /* a pointer to it. */ 3492393Syz155240 /* ------------------------------------------------------------------------ */ 3503448Sdh155122 static ips_stat_t *fr_statetstats(ifs) 3513448Sdh155122 ipf_stack_t *ifs; 3522393Syz155240 { 3533448Sdh155122 ifs->ifs_ips_stats.iss_active = ifs->ifs_ips_num; 3543448Sdh155122 ifs->ifs_ips_stats.iss_statesize = ifs->ifs_fr_statesize; 3553448Sdh155122 ifs->ifs_ips_stats.iss_statemax = ifs->ifs_fr_statemax; 3563448Sdh155122 ifs->ifs_ips_stats.iss_table = ifs->ifs_ips_table; 3573448Sdh155122 ifs->ifs_ips_stats.iss_list = ifs->ifs_ips_list; 3583448Sdh155122 ifs->ifs_ips_stats.iss_ticks = ifs->ifs_fr_ticks; 3593448Sdh155122 return &ifs->ifs_ips_stats; 3602393Syz155240 } 3612393Syz155240 3622393Syz155240 /* ------------------------------------------------------------------------ */ 3632393Syz155240 /* Function: fr_state_remove */ 3642393Syz155240 /* Returns: int - 0 == success, != 0 == failure */ 3652393Syz155240 /* Parameters: data(I) - pointer to state structure to delete from table */ 3662393Syz155240 /* */ 3672393Syz155240 /* Search for a state structure that matches the one passed, according to */ 3682393Syz155240 /* the IP addresses and other protocol specific information. */ 3692393Syz155240 /* ------------------------------------------------------------------------ */ 3703448Sdh155122 static int fr_state_remove(data, ifs) 3712393Syz155240 caddr_t data; 3723448Sdh155122 ipf_stack_t *ifs; 3732393Syz155240 { 3742393Syz155240 ipstate_t *sp, st; 3752393Syz155240 int error; 3762393Syz155240 3772393Syz155240 sp = &st; 3782393Syz155240 error = fr_inobj(data, &st, IPFOBJ_IPSTATE); 3792393Syz155240 if (error) 3802393Syz155240 return EFAULT; 3812393Syz155240 3823448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 3833448Sdh155122 for (sp = ifs->ifs_ips_list; sp; sp = sp->is_next) 3842393Syz155240 if ((sp->is_p == st.is_p) && (sp->is_v == st.is_v) && 3852393Syz155240 !bcmp((caddr_t)&sp->is_src, (caddr_t)&st.is_src, 3862393Syz155240 sizeof(st.is_src)) && 3872393Syz155240 !bcmp((caddr_t)&sp->is_dst, (caddr_t)&st.is_src, 3882393Syz155240 sizeof(st.is_dst)) && 3892393Syz155240 !bcmp((caddr_t)&sp->is_ps, (caddr_t)&st.is_ps, 3902393Syz155240 sizeof(st.is_ps))) { 3913448Sdh155122 fr_delstate(sp, ISL_REMOVE, ifs); 3923448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 3932393Syz155240 return 0; 3942393Syz155240 } 3953448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 3962393Syz155240 return ESRCH; 3972393Syz155240 } 3982393Syz155240 3992393Syz155240 4002393Syz155240 /* ------------------------------------------------------------------------ */ 4012393Syz155240 /* Function: fr_state_ioctl */ 4022393Syz155240 /* Returns: int - 0 == success, != 0 == failure */ 4032393Syz155240 /* Parameters: data(I) - pointer to ioctl data */ 4042393Syz155240 /* cmd(I) - ioctl command integer */ 4052393Syz155240 /* mode(I) - file mode bits used with open */ 4062393Syz155240 /* */ 4072393Syz155240 /* Processes an ioctl call made to operate on the IP Filter state device. */ 4082393Syz155240 /* ------------------------------------------------------------------------ */ 4093448Sdh155122 int fr_state_ioctl(data, cmd, mode, uid, ctx, ifs) 4102393Syz155240 caddr_t data; 4112393Syz155240 ioctlcmd_t cmd; 4123448Sdh155122 int mode, uid; 4133448Sdh155122 void *ctx; 4143448Sdh155122 ipf_stack_t *ifs; 4152393Syz155240 { 4162393Syz155240 int arg, ret, error = 0; 4172393Syz155240 4182393Syz155240 switch (cmd) 4192393Syz155240 { 4202393Syz155240 /* 4212393Syz155240 * Delete an entry from the state table. 4222393Syz155240 */ 4232393Syz155240 case SIOCDELST : 4243448Sdh155122 error = fr_state_remove(data, ifs); 4252393Syz155240 break; 4262393Syz155240 /* 4272393Syz155240 * Flush the state table 4282393Syz155240 */ 4292393Syz155240 case SIOCIPFFL : 4302393Syz155240 BCOPYIN(data, (char *)&arg, sizeof(arg)); 4312393Syz155240 if (arg == 0 || arg == 1) { 4323448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 4333448Sdh155122 ret = fr_state_flush(arg, 4, ifs); 4343448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 4352393Syz155240 BCOPYOUT((char *)&ret, data, sizeof(ret)); 4362393Syz155240 } else 4372393Syz155240 error = EINVAL; 4382393Syz155240 break; 4392393Syz155240 #ifdef USE_INET6 4402393Syz155240 case SIOCIPFL6 : 4412393Syz155240 BCOPYIN(data, (char *)&arg, sizeof(arg)); 4422393Syz155240 if (arg == 0 || arg == 1) { 4433448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 4443448Sdh155122 ret = fr_state_flush(arg, 6, ifs); 4453448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 4462393Syz155240 BCOPYOUT((char *)&ret, data, sizeof(ret)); 4472393Syz155240 } else 4482393Syz155240 error = EINVAL; 4492393Syz155240 break; 4502393Syz155240 #endif 4512393Syz155240 #ifdef IPFILTER_LOG 4522393Syz155240 /* 4532393Syz155240 * Flush the state log. 4542393Syz155240 */ 4552393Syz155240 case SIOCIPFFB : 4562393Syz155240 if (!(mode & FWRITE)) 4572393Syz155240 error = EPERM; 4582393Syz155240 else { 4592393Syz155240 int tmp; 4602393Syz155240 4613448Sdh155122 tmp = ipflog_clear(IPL_LOGSTATE, ifs); 4622393Syz155240 BCOPYOUT((char *)&tmp, data, sizeof(tmp)); 4632393Syz155240 } 4642393Syz155240 break; 4652393Syz155240 /* 4662393Syz155240 * Turn logging of state information on/off. 4672393Syz155240 */ 4682393Syz155240 case SIOCSETLG : 4692393Syz155240 if (!(mode & FWRITE)) 4702393Syz155240 error = EPERM; 4712393Syz155240 else { 4723448Sdh155122 BCOPYIN((char *)data, 4733448Sdh155122 (char *)&ifs->ifs_ipstate_logging, 4743448Sdh155122 sizeof(ifs->ifs_ipstate_logging)); 4752393Syz155240 } 4762393Syz155240 break; 4772393Syz155240 /* 4782393Syz155240 * Return the current state of logging. 4792393Syz155240 */ 4802393Syz155240 case SIOCGETLG : 4813448Sdh155122 BCOPYOUT((char *)&ifs->ifs_ipstate_logging, (char *)data, 4823448Sdh155122 sizeof(ifs->ifs_ipstate_logging)); 4832393Syz155240 break; 4842393Syz155240 /* 4852393Syz155240 * Return the number of bytes currently waiting to be read. 4862393Syz155240 */ 4872393Syz155240 case FIONREAD : 4883448Sdh155122 arg = ifs->ifs_iplused[IPL_LOGSTATE]; /* returned in an int */ 4892393Syz155240 BCOPYOUT((char *)&arg, data, sizeof(arg)); 4902393Syz155240 break; 4912393Syz155240 #endif 4922393Syz155240 /* 4932393Syz155240 * Get the current state statistics. 4942393Syz155240 */ 4952393Syz155240 case SIOCGETFS : 4963448Sdh155122 error = fr_outobj(data, fr_statetstats(ifs), IPFOBJ_STATESTAT); 4972393Syz155240 break; 4982393Syz155240 /* 4992393Syz155240 * Lock/Unlock the state table. (Locking prevents any changes, which 5002393Syz155240 * means no packets match). 5012393Syz155240 */ 5022393Syz155240 case SIOCSTLCK : 5032393Syz155240 if (!(mode & FWRITE)) { 5042393Syz155240 error = EPERM; 5052393Syz155240 } else { 5063448Sdh155122 fr_lock(data, &ifs->ifs_fr_state_lock); 5072393Syz155240 } 5082393Syz155240 break; 5092393Syz155240 /* 5102393Syz155240 * Add an entry to the current state table. 5112393Syz155240 */ 5122393Syz155240 case SIOCSTPUT : 5133448Sdh155122 if (!ifs->ifs_fr_state_lock || !(mode &FWRITE)) { 5142393Syz155240 error = EACCES; 5152393Syz155240 break; 5162393Syz155240 } 5173448Sdh155122 error = fr_stputent(data, ifs); 5182393Syz155240 break; 5192393Syz155240 /* 5202393Syz155240 * Get a state table entry. 5212393Syz155240 */ 5222393Syz155240 case SIOCSTGET : 5233448Sdh155122 if (!ifs->ifs_fr_state_lock) { 5242393Syz155240 error = EACCES; 5252393Syz155240 break; 5262393Syz155240 } 5273448Sdh155122 error = fr_stgetent(data, ifs); 5282393Syz155240 break; 5293448Sdh155122 5303448Sdh155122 case SIOCGENITER : 5313448Sdh155122 { 5323448Sdh155122 ipftoken_t *token; 5333448Sdh155122 ipfgeniter_t iter; 5343448Sdh155122 5353448Sdh155122 error = fr_inobj(data, &iter, IPFOBJ_GENITER); 5363448Sdh155122 if (error != 0) 5373448Sdh155122 break; 5383448Sdh155122 5393448Sdh155122 token = ipf_findtoken(IPFGENITER_STATE, uid, ctx, ifs); 5403448Sdh155122 if (token != NULL) 5413448Sdh155122 error = fr_stateiter(token, &iter, ifs); 5423448Sdh155122 else 5433448Sdh155122 error = ESRCH; 5443448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_tokens); 5453448Sdh155122 break; 5463448Sdh155122 } 5473448Sdh155122 5483448Sdh155122 case SIOCIPFDELTOK : 5493448Sdh155122 (void) BCOPYIN(data, (char *)&arg, sizeof(arg)); 5503448Sdh155122 error = ipf_deltoken(arg, uid, ctx, ifs); 5513448Sdh155122 break; 5523448Sdh155122 5532393Syz155240 default : 5542393Syz155240 error = EINVAL; 5552393Syz155240 break; 5562393Syz155240 } 5572393Syz155240 return error; 5582393Syz155240 } 5592393Syz155240 5602393Syz155240 5612393Syz155240 /* ------------------------------------------------------------------------ */ 5622393Syz155240 /* Function: fr_stgetent */ 5632393Syz155240 /* Returns: int - 0 == success, != 0 == failure */ 5642393Syz155240 /* Parameters: data(I) - pointer to state structure to retrieve from table */ 5652393Syz155240 /* */ 5662393Syz155240 /* Copy out state information from the kernel to a user space process. If */ 5672393Syz155240 /* there is a filter rule associated with the state entry, copy that out */ 5682393Syz155240 /* as well. The entry to copy out is taken from the value of "ips_next" in */ 5692393Syz155240 /* the struct passed in and if not null and not found in the list of current*/ 5702393Syz155240 /* state entries, the retrieval fails. */ 5712393Syz155240 /* ------------------------------------------------------------------------ */ 5723448Sdh155122 int fr_stgetent(data, ifs) 5732393Syz155240 caddr_t data; 5743448Sdh155122 ipf_stack_t *ifs; 5752393Syz155240 { 5762393Syz155240 ipstate_t *is, *isn; 5772393Syz155240 ipstate_save_t ips; 5782393Syz155240 int error; 5792393Syz155240 5802393Syz155240 error = fr_inobj(data, &ips, IPFOBJ_STATESAVE); 5812393Syz155240 if (error) 5822393Syz155240 return EFAULT; 5832393Syz155240 5842393Syz155240 isn = ips.ips_next; 5852393Syz155240 if (isn == NULL) { 5863448Sdh155122 isn = ifs->ifs_ips_list; 5872393Syz155240 if (isn == NULL) { 5882393Syz155240 if (ips.ips_next == NULL) 5892393Syz155240 return ENOENT; 5902393Syz155240 return 0; 5912393Syz155240 } 5922393Syz155240 } else { 5932393Syz155240 /* 5942393Syz155240 * Make sure the pointer we're copying from exists in the 5952393Syz155240 * current list of entries. Security precaution to prevent 5962393Syz155240 * copying of random kernel data. 5972393Syz155240 */ 5983448Sdh155122 for (is = ifs->ifs_ips_list; is; is = is->is_next) 5992393Syz155240 if (is == isn) 6002393Syz155240 break; 6012393Syz155240 if (!is) 6022393Syz155240 return ESRCH; 6032393Syz155240 } 6042393Syz155240 ips.ips_next = isn->is_next; 6052393Syz155240 bcopy((char *)isn, (char *)&ips.ips_is, sizeof(ips.ips_is)); 6062393Syz155240 ips.ips_rule = isn->is_rule; 6072393Syz155240 if (isn->is_rule != NULL) 6082393Syz155240 bcopy((char *)isn->is_rule, (char *)&ips.ips_fr, 6092393Syz155240 sizeof(ips.ips_fr)); 6102393Syz155240 error = fr_outobj(data, &ips, IPFOBJ_STATESAVE); 6112393Syz155240 if (error) 6122393Syz155240 return EFAULT; 6132393Syz155240 return 0; 6142393Syz155240 } 6152393Syz155240 6162393Syz155240 6172393Syz155240 /* ------------------------------------------------------------------------ */ 6182393Syz155240 /* Function: fr_stputent */ 6192393Syz155240 /* Returns: int - 0 == success, != 0 == failure */ 6202393Syz155240 /* Parameters: data(I) - pointer to state information struct */ 6212393Syz155240 /* */ 6222393Syz155240 /* This function implements the SIOCSTPUT ioctl: insert a state entry into */ 6232393Syz155240 /* the state table. If the state info. includes a pointer to a filter rule */ 6242393Syz155240 /* then also add in an orphaned rule (will not show up in any "ipfstat -io" */ 6252393Syz155240 /* output. */ 6262393Syz155240 /* ------------------------------------------------------------------------ */ 6273448Sdh155122 int fr_stputent(data, ifs) 6282393Syz155240 caddr_t data; 6293448Sdh155122 ipf_stack_t *ifs; 6302393Syz155240 { 6312393Syz155240 ipstate_t *is, *isn; 6322393Syz155240 ipstate_save_t ips; 6332393Syz155240 int error, i; 6342393Syz155240 frentry_t *fr; 6352393Syz155240 char *name; 6362393Syz155240 6372393Syz155240 error = fr_inobj(data, &ips, IPFOBJ_STATESAVE); 6382393Syz155240 if (error) 6392393Syz155240 return EFAULT; 6402393Syz155240 6412393Syz155240 KMALLOC(isn, ipstate_t *); 6422393Syz155240 if (isn == NULL) 6432393Syz155240 return ENOMEM; 6442393Syz155240 6452393Syz155240 bcopy((char *)&ips.ips_is, (char *)isn, sizeof(*isn)); 6462393Syz155240 bzero((char *)isn, offsetof(struct ipstate, is_pkts)); 6472393Syz155240 isn->is_sti.tqe_pnext = NULL; 6482393Syz155240 isn->is_sti.tqe_next = NULL; 6492393Syz155240 isn->is_sti.tqe_ifq = NULL; 6502393Syz155240 isn->is_sti.tqe_parent = isn; 6512393Syz155240 isn->is_ifp[0] = NULL; 6522393Syz155240 isn->is_ifp[1] = NULL; 6532393Syz155240 isn->is_ifp[2] = NULL; 6542393Syz155240 isn->is_ifp[3] = NULL; 6552393Syz155240 isn->is_sync = NULL; 6562393Syz155240 fr = ips.ips_rule; 6572393Syz155240 6582393Syz155240 if (fr == NULL) { 6593448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 6603448Sdh155122 fr_stinsert(isn, 0, ifs); 6612393Syz155240 MUTEX_EXIT(&isn->is_lock); 6623448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 6632393Syz155240 return 0; 6642393Syz155240 } 6652393Syz155240 6662393Syz155240 if (isn->is_flags & SI_NEWFR) { 6672393Syz155240 KMALLOC(fr, frentry_t *); 6682393Syz155240 if (fr == NULL) { 6692393Syz155240 KFREE(isn); 6702393Syz155240 return ENOMEM; 6712393Syz155240 } 6722393Syz155240 bcopy((char *)&ips.ips_fr, (char *)fr, sizeof(*fr)); 6732393Syz155240 isn->is_rule = fr; 6742393Syz155240 ips.ips_is.is_rule = fr; 6752393Syz155240 MUTEX_NUKE(&fr->fr_lock); 6762393Syz155240 MUTEX_INIT(&fr->fr_lock, "state filter rule lock"); 6772393Syz155240 6782393Syz155240 /* 6792393Syz155240 * Look up all the interface names in the rule. 6802393Syz155240 */ 6812393Syz155240 for (i = 0; i < 4; i++) { 6822393Syz155240 name = fr->fr_ifnames[i]; 6833448Sdh155122 fr->fr_ifas[i] = fr_resolvenic(name, fr->fr_v, ifs); 6842393Syz155240 name = isn->is_ifname[i]; 6853448Sdh155122 isn->is_ifp[i] = fr_resolvenic(name, isn->is_v, ifs); 6862393Syz155240 } 6872393Syz155240 6882393Syz155240 fr->fr_ref = 0; 6892393Syz155240 fr->fr_dsize = 0; 6902393Syz155240 fr->fr_data = NULL; 6912393Syz155240 6923448Sdh155122 fr_resolvedest(&fr->fr_tif, fr->fr_v, ifs); 6933448Sdh155122 fr_resolvedest(&fr->fr_dif, fr->fr_v, ifs); 6943894Sjojemann fr_resolvedest(&fr->fr_rif, fr->fr_v, ifs); 6952393Syz155240 6962393Syz155240 /* 6972393Syz155240 * send a copy back to userland of what we ended up 6982393Syz155240 * to allow for verification. 6992393Syz155240 */ 7002393Syz155240 error = fr_outobj(data, &ips, IPFOBJ_STATESAVE); 7012393Syz155240 if (error) { 7022393Syz155240 KFREE(isn); 7032393Syz155240 MUTEX_DESTROY(&fr->fr_lock); 7042393Syz155240 KFREE(fr); 7052393Syz155240 return EFAULT; 7062393Syz155240 } 7073448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 7083448Sdh155122 fr_stinsert(isn, 0, ifs); 7092393Syz155240 MUTEX_EXIT(&isn->is_lock); 7103448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 7112393Syz155240 7122393Syz155240 } else { 7133448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 7143448Sdh155122 for (is = ifs->ifs_ips_list; is; is = is->is_next) 7152393Syz155240 if (is->is_rule == fr) { 7163448Sdh155122 fr_stinsert(isn, 0, ifs); 7172393Syz155240 MUTEX_EXIT(&isn->is_lock); 7182393Syz155240 break; 7192393Syz155240 } 7202393Syz155240 7212393Syz155240 if (is == NULL) { 7222393Syz155240 KFREE(isn); 7232393Syz155240 isn = NULL; 7242393Syz155240 } 7253448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 7262393Syz155240 7272393Syz155240 return (isn == NULL) ? ESRCH : 0; 7282393Syz155240 } 7292393Syz155240 7302393Syz155240 return 0; 7312393Syz155240 } 7322393Syz155240 7332393Syz155240 7342393Syz155240 /* ------------------------------------------------------------------------ */ 7352393Syz155240 /* Function: fr_stinsert */ 7362393Syz155240 /* Returns: Nil */ 7372393Syz155240 /* Parameters: is(I) - pointer to state structure */ 7382393Syz155240 /* rev(I) - flag indicating forward/reverse direction of packet */ 7392393Syz155240 /* */ 7402393Syz155240 /* Inserts a state structure into the hash table (for lookups) and the list */ 7412393Syz155240 /* of state entries (for enumeration). Resolves all of the interface names */ 7422393Syz155240 /* to pointers and adjusts running stats for the hash table as appropriate. */ 7432393Syz155240 /* */ 7442393Syz155240 /* Locking: it is assumed that some kind of lock on ipf_state is held. */ 7452393Syz155240 /* Exits with is_lock initialised and held. */ 7462393Syz155240 /* ------------------------------------------------------------------------ */ 7473448Sdh155122 void fr_stinsert(is, rev, ifs) 7482393Syz155240 ipstate_t *is; 7492393Syz155240 int rev; 7503448Sdh155122 ipf_stack_t *ifs; 7512393Syz155240 { 7522393Syz155240 frentry_t *fr; 7532393Syz155240 u_int hv; 7542393Syz155240 int i; 7552393Syz155240 7562393Syz155240 MUTEX_INIT(&is->is_lock, "ipf state entry"); 7572393Syz155240 7582393Syz155240 fr = is->is_rule; 7592393Syz155240 if (fr != NULL) { 7602393Syz155240 MUTEX_ENTER(&fr->fr_lock); 7612393Syz155240 fr->fr_ref++; 7622393Syz155240 fr->fr_statecnt++; 7632393Syz155240 MUTEX_EXIT(&fr->fr_lock); 7642393Syz155240 } 7652393Syz155240 7662393Syz155240 /* 7672393Syz155240 * Look up all the interface names in the state entry. 7682393Syz155240 */ 7692393Syz155240 for (i = 0; i < 4; i++) { 7702393Syz155240 if (is->is_ifp[i] != NULL) 7712393Syz155240 continue; 7723448Sdh155122 is->is_ifp[i] = fr_resolvenic(is->is_ifname[i], is->is_v, ifs); 7732393Syz155240 } 7742393Syz155240 7752393Syz155240 /* 7762393Syz155240 * If we could trust is_hv, then the modulous would not be needed, but 7772393Syz155240 * when running with IPFILTER_SYNC, this stops bad values. 7782393Syz155240 */ 7793448Sdh155122 hv = is->is_hv % ifs->ifs_fr_statesize; 7802393Syz155240 is->is_hv = hv; 7812393Syz155240 7822393Syz155240 /* 7832393Syz155240 * We need to get both of these locks...the first because it is 7842393Syz155240 * possible that once the insert is complete another packet might 7852393Syz155240 * come along, match the entry and want to update it. 7862393Syz155240 */ 7872393Syz155240 MUTEX_ENTER(&is->is_lock); 7883448Sdh155122 MUTEX_ENTER(&ifs->ifs_ipf_stinsert); 7892393Syz155240 7902393Syz155240 /* 7912393Syz155240 * add into list table. 7922393Syz155240 */ 7933448Sdh155122 if (ifs->ifs_ips_list != NULL) 7943448Sdh155122 ifs->ifs_ips_list->is_pnext = &is->is_next; 7953448Sdh155122 is->is_pnext = &ifs->ifs_ips_list; 7963448Sdh155122 is->is_next = ifs->ifs_ips_list; 7973448Sdh155122 ifs->ifs_ips_list = is; 7983448Sdh155122 7993448Sdh155122 if (ifs->ifs_ips_table[hv] != NULL) 8003448Sdh155122 ifs->ifs_ips_table[hv]->is_phnext = &is->is_hnext; 8012393Syz155240 else 8023448Sdh155122 ifs->ifs_ips_stats.iss_inuse++; 8033448Sdh155122 is->is_phnext = ifs->ifs_ips_table + hv; 8043448Sdh155122 is->is_hnext = ifs->ifs_ips_table[hv]; 8053448Sdh155122 ifs->ifs_ips_table[hv] = is; 8063448Sdh155122 ifs->ifs_ips_stats.iss_bucketlen[hv]++; 8073448Sdh155122 ifs->ifs_ips_num++; 8083448Sdh155122 MUTEX_EXIT(&ifs->ifs_ipf_stinsert); 8093448Sdh155122 8103448Sdh155122 fr_setstatequeue(is, rev, ifs); 8112393Syz155240 } 8122393Syz155240 8132393Syz155240 8142393Syz155240 /* ------------------------------------------------------------------------ */ 8152393Syz155240 /* Function: fr_addstate */ 8162393Syz155240 /* Returns: ipstate_t* - NULL == failure, else pointer to new state */ 8172393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 8182393Syz155240 /* stsave(O) - pointer to place to save pointer to created */ 8192393Syz155240 /* state structure. */ 8202393Syz155240 /* flags(I) - flags to use when creating the structure */ 8212393Syz155240 /* */ 8222393Syz155240 /* Creates a new IP state structure from the packet information collected. */ 8232393Syz155240 /* Inserts it into the state table and appends to the bottom of the active */ 8242393Syz155240 /* list. If the capacity of the table has reached the maximum allowed then */ 8252393Syz155240 /* the call will fail and a flush is scheduled for the next timeout call. */ 8262393Syz155240 /* ------------------------------------------------------------------------ */ 8272393Syz155240 ipstate_t *fr_addstate(fin, stsave, flags) 8282393Syz155240 fr_info_t *fin; 8292393Syz155240 ipstate_t **stsave; 8302393Syz155240 u_int flags; 8312393Syz155240 { 8322393Syz155240 ipstate_t *is, ips; 8332393Syz155240 struct icmp *ic; 8342393Syz155240 u_int pass, hv; 8352393Syz155240 frentry_t *fr; 8362393Syz155240 tcphdr_t *tcp; 8372393Syz155240 grehdr_t *gre; 8382393Syz155240 void *ifp; 8392393Syz155240 int out; 8403448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 8413448Sdh155122 8423448Sdh155122 if (ifs->ifs_fr_state_lock || 8432393Syz155240 (fin->fin_flx & (FI_SHORT|FI_STATE|FI_FRAGBODY|FI_BAD))) 8442393Syz155240 return NULL; 8452393Syz155240 8462393Syz155240 if ((fin->fin_flx & FI_OOW) && !(fin->fin_tcpf & TH_SYN)) 8472393Syz155240 return NULL; 8482393Syz155240 8492393Syz155240 /* 8502393Syz155240 * If a "keep state" rule has reached the maximum number of references 8512393Syz155240 * to it, then schedule an automatic flush in case we can clear out 8522944Sjojemann * some "dead old wood". Note that because the lock isn't held on 8532944Sjojemann * fr it is possible that we could overflow. The cost of overflowing 8542944Sjojemann * is being ignored here as the number by which it can overflow is 8552944Sjojemann * a product of the number of simultaneous threads that could be 8562944Sjojemann * executing in here, so a limit of 100 won't result in 200, but could 8572944Sjojemann * result in 101 or 102. 8582393Syz155240 */ 8592944Sjojemann fr = fin->fin_fr; 8602944Sjojemann if (fr != NULL) { 8613448Sdh155122 if ((ifs->ifs_ips_num == ifs->ifs_fr_statemax) && (fr->fr_statemax == 0)) { 8623448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_max); 8633448Sdh155122 ifs->ifs_fr_state_doflush = 1; 8642944Sjojemann return NULL; 8652944Sjojemann } 8662944Sjojemann if ((fr->fr_statemax != 0) && 8672944Sjojemann (fr->fr_statecnt >= fr->fr_statemax)) { 8683448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_maxref); 8693448Sdh155122 ifs->ifs_fr_state_doflush = 1; 8702944Sjojemann return NULL; 8712944Sjojemann } 8722393Syz155240 } 8732393Syz155240 8742393Syz155240 pass = (fr == NULL) ? 0 : fr->fr_flags; 8752393Syz155240 8762393Syz155240 ic = NULL; 8772393Syz155240 tcp = NULL; 8782393Syz155240 out = fin->fin_out; 8792393Syz155240 is = &ips; 8802393Syz155240 bzero((char *)is, sizeof(*is)); 8813448Sdh155122 is->is_die = 1 + ifs->ifs_fr_ticks; 8822393Syz155240 8832393Syz155240 /* 8842393Syz155240 * Copy and calculate... 8852393Syz155240 */ 8862393Syz155240 hv = (is->is_p = fin->fin_fi.fi_p); 8872393Syz155240 is->is_src = fin->fin_fi.fi_src; 8882393Syz155240 hv += is->is_saddr; 8892393Syz155240 is->is_dst = fin->fin_fi.fi_dst; 8902393Syz155240 hv += is->is_daddr; 8912393Syz155240 #ifdef USE_INET6 8922393Syz155240 if (fin->fin_v == 6) { 8932393Syz155240 /* 8942393Syz155240 * For ICMPv6, we check to see if the destination address is 8952393Syz155240 * a multicast address. If it is, do not include it in the 8962393Syz155240 * calculation of the hash because the correct reply will come 8972393Syz155240 * back from a real address, not a multicast address. 8982393Syz155240 */ 8992393Syz155240 if ((is->is_p == IPPROTO_ICMPV6) && 9002393Syz155240 IN6_IS_ADDR_MULTICAST(&is->is_dst.in6)) { 9012393Syz155240 /* 9022393Syz155240 * So you can do keep state with neighbour discovery. 9032393Syz155240 * 9042393Syz155240 * Here we could use the address from the neighbour 9052393Syz155240 * solicit message to put in the state structure and 9062393Syz155240 * we could use that without a wildcard flag too... 9072393Syz155240 */ 9082393Syz155240 is->is_flags |= SI_W_DADDR; 9092393Syz155240 hv -= is->is_daddr; 9102393Syz155240 } else { 9112393Syz155240 hv += is->is_dst.i6[1]; 9122393Syz155240 hv += is->is_dst.i6[2]; 9132393Syz155240 hv += is->is_dst.i6[3]; 9142393Syz155240 } 9152393Syz155240 hv += is->is_src.i6[1]; 9162393Syz155240 hv += is->is_src.i6[2]; 9172393Syz155240 hv += is->is_src.i6[3]; 9182393Syz155240 } 9192393Syz155240 #endif 9202393Syz155240 9212393Syz155240 switch (is->is_p) 9222393Syz155240 { 9232393Syz155240 #ifdef USE_INET6 9242393Syz155240 case IPPROTO_ICMPV6 : 9252393Syz155240 ic = fin->fin_dp; 9262393Syz155240 9272393Syz155240 switch (ic->icmp_type) 9282393Syz155240 { 9292393Syz155240 case ICMP6_ECHO_REQUEST : 9302393Syz155240 is->is_icmp.ici_type = ic->icmp_type; 9312393Syz155240 hv += (is->is_icmp.ici_id = ic->icmp_id); 9322393Syz155240 break; 9332393Syz155240 case ICMP6_MEMBERSHIP_QUERY : 9342393Syz155240 case ND_ROUTER_SOLICIT : 9352393Syz155240 case ND_NEIGHBOR_SOLICIT : 9362393Syz155240 case ICMP6_NI_QUERY : 9372393Syz155240 is->is_icmp.ici_type = ic->icmp_type; 9382393Syz155240 break; 9392393Syz155240 default : 9402393Syz155240 return NULL; 9412393Syz155240 } 9423448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_icmp); 9432393Syz155240 break; 9442393Syz155240 #endif 9452393Syz155240 case IPPROTO_ICMP : 9462393Syz155240 ic = fin->fin_dp; 9472393Syz155240 9482393Syz155240 switch (ic->icmp_type) 9492393Syz155240 { 9502393Syz155240 case ICMP_ECHO : 9512393Syz155240 case ICMP_TSTAMP : 9522393Syz155240 case ICMP_IREQ : 9532393Syz155240 case ICMP_MASKREQ : 9542393Syz155240 is->is_icmp.ici_type = ic->icmp_type; 9552393Syz155240 hv += (is->is_icmp.ici_id = ic->icmp_id); 9562393Syz155240 break; 9572393Syz155240 default : 9582393Syz155240 return NULL; 9592393Syz155240 } 9603448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_icmp); 9612393Syz155240 break; 9622393Syz155240 9632393Syz155240 case IPPROTO_GRE : 9642393Syz155240 gre = fin->fin_dp; 9652393Syz155240 9662393Syz155240 is->is_gre.gs_flags = gre->gr_flags; 9672393Syz155240 is->is_gre.gs_ptype = gre->gr_ptype; 9682393Syz155240 if (GRE_REV(is->is_gre.gs_flags) == 1) { 9692393Syz155240 is->is_call[0] = fin->fin_data[0]; 9702393Syz155240 is->is_call[1] = fin->fin_data[1]; 9712393Syz155240 } 9722393Syz155240 break; 9732393Syz155240 9742393Syz155240 case IPPROTO_TCP : 9752393Syz155240 tcp = fin->fin_dp; 9762393Syz155240 9772393Syz155240 if (tcp->th_flags & TH_RST) 9782393Syz155240 return NULL; 9792393Syz155240 /* 9802393Syz155240 * The endian of the ports doesn't matter, but the ack and 9812393Syz155240 * sequence numbers do as we do mathematics on them later. 9822393Syz155240 */ 9832393Syz155240 is->is_sport = htons(fin->fin_data[0]); 9842393Syz155240 is->is_dport = htons(fin->fin_data[1]); 9852393Syz155240 if ((flags & (SI_W_DPORT|SI_W_SPORT)) == 0) { 9862393Syz155240 hv += is->is_sport; 9872393Syz155240 hv += is->is_dport; 9882393Syz155240 } 9892393Syz155240 9902393Syz155240 /* 9912393Syz155240 * If this is a real packet then initialise fields in the 9922393Syz155240 * state information structure from the TCP header information. 9932393Syz155240 */ 9942393Syz155240 9952393Syz155240 is->is_maxdwin = 1; 9962393Syz155240 is->is_maxswin = ntohs(tcp->th_win); 9972393Syz155240 if (is->is_maxswin == 0) 9982393Syz155240 is->is_maxswin = 1; 9992393Syz155240 10002393Syz155240 if ((fin->fin_flx & FI_IGNORE) == 0) { 10012393Syz155240 is->is_send = ntohl(tcp->th_seq) + fin->fin_dlen - 10022393Syz155240 (TCP_OFF(tcp) << 2) + 10032393Syz155240 ((tcp->th_flags & TH_SYN) ? 1 : 0) + 10042393Syz155240 ((tcp->th_flags & TH_FIN) ? 1 : 0); 10052393Syz155240 is->is_maxsend = is->is_send; 10062393Syz155240 10072393Syz155240 /* 10082393Syz155240 * Window scale option is only present in 10092393Syz155240 * SYN/SYN-ACK packet. 10102393Syz155240 */ 10112393Syz155240 if ((tcp->th_flags & ~(TH_FIN|TH_ACK|TH_ECNALL)) == 10122393Syz155240 TH_SYN && 10132393Syz155240 (TCP_OFF(tcp) > (sizeof(tcphdr_t) >> 2))) { 10142393Syz155240 if (fr_tcpoptions(fin, tcp, 10152393Syz155240 &is->is_tcp.ts_data[0])) 10162393Syz155240 is->is_swinflags = TCP_WSCALE_SEEN| 10172393Syz155240 TCP_WSCALE_FIRST; 10182393Syz155240 } 10192393Syz155240 10202393Syz155240 if ((fin->fin_out != 0) && (pass & FR_NEWISN) != 0) { 10212393Syz155240 fr_checknewisn(fin, is); 10222393Syz155240 fr_fixoutisn(fin, is); 10232393Syz155240 } 10242393Syz155240 10252393Syz155240 if ((tcp->th_flags & TH_OPENING) == TH_SYN) 10262393Syz155240 flags |= IS_TCPFSM; 10272393Syz155240 else { 10282393Syz155240 is->is_maxdwin = is->is_maxswin * 2; 10292393Syz155240 is->is_dend = ntohl(tcp->th_ack); 10302393Syz155240 is->is_maxdend = ntohl(tcp->th_ack); 10312393Syz155240 is->is_maxdwin *= 2; 10322393Syz155240 } 10332393Syz155240 } 10342393Syz155240 10352393Syz155240 /* 10362393Syz155240 * If we're creating state for a starting connection, start the 10372393Syz155240 * timer on it as we'll never see an error if it fails to 10382393Syz155240 * connect. 10392393Syz155240 */ 10403448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_tcp); 10412393Syz155240 break; 10422393Syz155240 10432393Syz155240 case IPPROTO_UDP : 10442393Syz155240 tcp = fin->fin_dp; 10452393Syz155240 10462393Syz155240 is->is_sport = htons(fin->fin_data[0]); 10472393Syz155240 is->is_dport = htons(fin->fin_data[1]); 10482393Syz155240 if ((flags & (SI_W_DPORT|SI_W_SPORT)) == 0) { 10492393Syz155240 hv += tcp->th_dport; 10502393Syz155240 hv += tcp->th_sport; 10512393Syz155240 } 10523448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_udp); 10532393Syz155240 break; 10542393Syz155240 10552393Syz155240 default : 10562393Syz155240 break; 10572393Syz155240 } 10583448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 10592393Syz155240 is->is_hv = hv; 10602393Syz155240 is->is_rule = fr; 10612393Syz155240 is->is_flags = flags & IS_INHERITED; 10622393Syz155240 10632393Syz155240 /* 10642393Syz155240 * Look for identical state. 10652393Syz155240 */ 10663448Sdh155122 for (is = ifs->ifs_ips_table[is->is_hv % ifs->ifs_fr_statesize]; 10673448Sdh155122 is != NULL; 10682393Syz155240 is = is->is_hnext) { 10692393Syz155240 if (bcmp(&ips.is_src, &is->is_src, 10702393Syz155240 offsetof(struct ipstate, is_ps) - 10712393Syz155240 offsetof(struct ipstate, is_src)) == 0) 10722393Syz155240 break; 10732393Syz155240 } 10742393Syz155240 if (is != NULL) 10752393Syz155240 return NULL; 10762393Syz155240 10773448Sdh155122 if (ifs->ifs_ips_stats.iss_bucketlen[hv] >= ifs->ifs_fr_state_maxbucket) { 10783448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_bucketfull); 10792393Syz155240 return NULL; 10802393Syz155240 } 10812393Syz155240 KMALLOC(is, ipstate_t *); 10822393Syz155240 if (is == NULL) { 10833448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_nomem); 10842393Syz155240 return NULL; 10852393Syz155240 } 10862393Syz155240 bcopy((char *)&ips, (char *)is, sizeof(*is)); 10872393Syz155240 /* 10882393Syz155240 * Do not do the modulous here, it is done in fr_stinsert(). 10892393Syz155240 */ 10902393Syz155240 if (fr != NULL) { 10912393Syz155240 (void) strncpy(is->is_group, fr->fr_group, FR_GROUPLEN); 10922393Syz155240 if (fr->fr_age[0] != 0) { 10933448Sdh155122 is->is_tqehead[0] = 10943448Sdh155122 fr_addtimeoutqueue(&ifs->ifs_ips_utqe, 10953448Sdh155122 fr->fr_age[0], ifs); 10962393Syz155240 is->is_sti.tqe_flags |= TQE_RULEBASED; 10972393Syz155240 } 10982393Syz155240 if (fr->fr_age[1] != 0) { 10993448Sdh155122 is->is_tqehead[1] = 11003448Sdh155122 fr_addtimeoutqueue(&ifs->ifs_ips_utqe, 11013448Sdh155122 fr->fr_age[1], ifs); 11022393Syz155240 is->is_sti.tqe_flags |= TQE_RULEBASED; 11032393Syz155240 } 11042393Syz155240 is->is_tag = fr->fr_logtag; 11052393Syz155240 11062393Syz155240 is->is_ifp[(out << 1) + 1] = fr->fr_ifas[1]; 11072393Syz155240 is->is_ifp[(1 - out) << 1] = fr->fr_ifas[2]; 11082393Syz155240 is->is_ifp[((1 - out) << 1) + 1] = fr->fr_ifas[3]; 11092393Syz155240 11102393Syz155240 if (((ifp = fr->fr_ifas[1]) != NULL) && 11112393Syz155240 (ifp != (void *)-1)) { 11122958Sdr146992 COPYIFNAME(ifp, is->is_ifname[(out << 1) + 1], fr->fr_v); 11132393Syz155240 } 11142393Syz155240 if (((ifp = fr->fr_ifas[2]) != NULL) && 11152393Syz155240 (ifp != (void *)-1)) { 11162958Sdr146992 COPYIFNAME(ifp, is->is_ifname[(1 - out) << 1], fr->fr_v); 11172393Syz155240 } 11182393Syz155240 if (((ifp = fr->fr_ifas[3]) != NULL) && 11192393Syz155240 (ifp != (void *)-1)) { 11202958Sdr146992 COPYIFNAME(ifp, is->is_ifname[((1 - out) << 1) + 1], fr->fr_v); 11212393Syz155240 } 11222393Syz155240 } else { 11233448Sdh155122 pass = ifs->ifs_fr_flags; 11242393Syz155240 is->is_tag = FR_NOLOGTAG; 11252393Syz155240 } 11262393Syz155240 11272393Syz155240 is->is_ifp[out << 1] = fin->fin_ifp; 11282393Syz155240 if (fin->fin_ifp != NULL) { 11292958Sdr146992 COPYIFNAME(fin->fin_ifp, is->is_ifname[out << 1], fr->fr_v); 11302393Syz155240 } 11312393Syz155240 11322393Syz155240 /* 11332393Syz155240 * It may seem strange to set is_ref to 2, but fr_check() will call 11342393Syz155240 * fr_statederef() after calling fr_addstate() and the idea is to 11352393Syz155240 * have it exist at the end of fr_check() with is_ref == 1. 11362393Syz155240 */ 11372393Syz155240 is->is_ref = 2; 11382393Syz155240 is->is_pass = pass; 11392393Syz155240 is->is_pkts[0] = 0, is->is_bytes[0] = 0; 11402393Syz155240 is->is_pkts[1] = 0, is->is_bytes[1] = 0; 11412393Syz155240 is->is_pkts[2] = 0, is->is_bytes[2] = 0; 11422393Syz155240 is->is_pkts[3] = 0, is->is_bytes[3] = 0; 11432393Syz155240 if ((fin->fin_flx & FI_IGNORE) == 0) { 11442393Syz155240 is->is_pkts[out] = 1; 11452393Syz155240 is->is_bytes[out] = fin->fin_plen; 11462393Syz155240 is->is_flx[out][0] = fin->fin_flx & FI_CMP; 11472393Syz155240 is->is_flx[out][0] &= ~FI_OOW; 11482393Syz155240 } 11492393Syz155240 11502393Syz155240 if (pass & FR_STSTRICT) 11512393Syz155240 is->is_flags |= IS_STRICT; 11522393Syz155240 11532393Syz155240 if (pass & FR_STATESYNC) 11542393Syz155240 is->is_flags |= IS_STATESYNC; 11552393Syz155240 11562393Syz155240 /* 11572393Syz155240 * We want to check everything that is a property of this packet, 11582393Syz155240 * but we don't (automatically) care about it's fragment status as 11592393Syz155240 * this may change. 11602393Syz155240 */ 11612393Syz155240 is->is_v = fin->fin_v; 11622393Syz155240 is->is_opt[0] = fin->fin_optmsk; 11632393Syz155240 is->is_optmsk[0] = 0xffffffff; 11642393Syz155240 is->is_optmsk[1] = 0xffffffff; 11652393Syz155240 if (is->is_v == 6) { 11662393Syz155240 is->is_opt[0] &= ~0x8; 11672393Syz155240 is->is_optmsk[0] &= ~0x8; 11682393Syz155240 is->is_optmsk[1] &= ~0x8; 11692393Syz155240 } 11702393Syz155240 is->is_sec = fin->fin_secmsk; 11712393Syz155240 is->is_secmsk = 0xffff; 11722393Syz155240 is->is_auth = fin->fin_auth; 11732393Syz155240 is->is_authmsk = 0xffff; 11742393Syz155240 if (flags & (SI_WILDP|SI_WILDA)) { 11753448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_wild); 11762393Syz155240 } 11772393Syz155240 is->is_rulen = fin->fin_rule; 11782393Syz155240 11792393Syz155240 11802393Syz155240 if (pass & FR_LOGFIRST) 11812393Syz155240 is->is_pass &= ~(FR_LOGFIRST|FR_LOG); 11822393Syz155240 11833448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 11842393Syz155240 is->is_me = stsave; 11852393Syz155240 11863448Sdh155122 fr_stinsert(is, fin->fin_rev, ifs); 11872393Syz155240 11882393Syz155240 if (fin->fin_p == IPPROTO_TCP) { 11892393Syz155240 /* 11902393Syz155240 * If we're creating state for a starting connection, start the 11912393Syz155240 * timer on it as we'll never see an error if it fails to 11922393Syz155240 * connect. 11932393Syz155240 */ 11943448Sdh155122 (void) fr_tcp_age(&is->is_sti, fin, ifs->ifs_ips_tqtqb, 11953448Sdh155122 is->is_flags); 11962393Syz155240 MUTEX_EXIT(&is->is_lock); 11972393Syz155240 #ifdef IPFILTER_SCAN 11982393Syz155240 if ((is->is_flags & SI_CLONE) == 0) 11992393Syz155240 (void) ipsc_attachis(is); 12002393Syz155240 #endif 12012393Syz155240 } else { 12022393Syz155240 MUTEX_EXIT(&is->is_lock); 12032393Syz155240 } 12042393Syz155240 #ifdef IPFILTER_SYNC 12052393Syz155240 if ((is->is_flags & IS_STATESYNC) && ((is->is_flags & SI_CLONE) == 0)) 12062393Syz155240 is->is_sync = ipfsync_new(SMC_STATE, fin, is); 12072393Syz155240 #endif 12083448Sdh155122 if (ifs->ifs_ipstate_logging) 12093448Sdh155122 ipstate_log(is, ISL_NEW, ifs); 12103448Sdh155122 12113448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 12122393Syz155240 fin->fin_state = is; 12132393Syz155240 fin->fin_rev = IP6_NEQ(&is->is_dst, &fin->fin_daddr); 12142393Syz155240 fin->fin_flx |= FI_STATE; 12152393Syz155240 if (fin->fin_flx & FI_FRAG) 12162393Syz155240 (void) fr_newfrag(fin, pass ^ FR_KEEPSTATE); 12172393Syz155240 12182393Syz155240 return is; 12192393Syz155240 } 12202393Syz155240 12212393Syz155240 12222393Syz155240 /* ------------------------------------------------------------------------ */ 12232393Syz155240 /* Function: fr_tcpoptions */ 12242393Syz155240 /* Returns: int - 1 == packet matches state entry, 0 == it does not */ 12252393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 12262393Syz155240 /* tcp(I) - pointer to TCP packet header */ 12272393Syz155240 /* td(I) - pointer to TCP data held as part of the state */ 12282393Syz155240 /* */ 12292393Syz155240 /* Look after the TCP header for any options and deal with those that are */ 12302393Syz155240 /* present. Record details about those that we recogise. */ 12312393Syz155240 /* ------------------------------------------------------------------------ */ 12322393Syz155240 static int fr_tcpoptions(fin, tcp, td) 12332393Syz155240 fr_info_t *fin; 12342393Syz155240 tcphdr_t *tcp; 12352393Syz155240 tcpdata_t *td; 12362393Syz155240 { 12372393Syz155240 int off, mlen, ol, i, len, retval; 12382393Syz155240 char buf[64], *s, opt; 12392393Syz155240 mb_t *m = NULL; 12402393Syz155240 12412393Syz155240 len = (TCP_OFF(tcp) << 2); 12422393Syz155240 if (fin->fin_dlen < len) 12432393Syz155240 return 0; 12442393Syz155240 len -= sizeof(*tcp); 12452393Syz155240 12462393Syz155240 off = fin->fin_plen - fin->fin_dlen + sizeof(*tcp) + fin->fin_ipoff; 12472393Syz155240 12482393Syz155240 m = fin->fin_m; 12492393Syz155240 mlen = MSGDSIZE(m) - off; 12502393Syz155240 if (len > mlen) { 12512393Syz155240 len = mlen; 12522393Syz155240 retval = 0; 12532393Syz155240 } else { 12542393Syz155240 retval = 1; 12552393Syz155240 } 12562393Syz155240 12572393Syz155240 COPYDATA(m, off, len, buf); 12582393Syz155240 12592393Syz155240 for (s = buf; len > 0; ) { 12602393Syz155240 opt = *s; 12612393Syz155240 if (opt == TCPOPT_EOL) 12622393Syz155240 break; 12632393Syz155240 else if (opt == TCPOPT_NOP) 12642393Syz155240 ol = 1; 12652393Syz155240 else { 12662393Syz155240 if (len < 2) 12672393Syz155240 break; 12682393Syz155240 ol = (int)*(s + 1); 12692393Syz155240 if (ol < 2 || ol > len) 12702393Syz155240 break; 12712393Syz155240 12722393Syz155240 /* 12732393Syz155240 * Extract the TCP options we are interested in out of 12742393Syz155240 * the header and store them in the the tcpdata struct. 12752393Syz155240 */ 12762393Syz155240 switch (opt) 12772393Syz155240 { 12782393Syz155240 case TCPOPT_WINDOW : 12792393Syz155240 if (ol == TCPOLEN_WINDOW) { 12802393Syz155240 i = (int)*(s + 2); 12812393Syz155240 if (i > TCP_WSCALE_MAX) 12822393Syz155240 i = TCP_WSCALE_MAX; 12832393Syz155240 else if (i < 0) 12842393Syz155240 i = 0; 12852393Syz155240 td->td_winscale = i; 12862393Syz155240 } 12872393Syz155240 break; 12882393Syz155240 case TCPOPT_MAXSEG : 12892393Syz155240 /* 12902393Syz155240 * So, if we wanted to set the TCP MAXSEG, 12912393Syz155240 * it should be done here... 12922393Syz155240 */ 12932393Syz155240 if (ol == TCPOLEN_MAXSEG) { 12942393Syz155240 i = (int)*(s + 2); 12952393Syz155240 i <<= 8; 12962393Syz155240 i += (int)*(s + 3); 12972393Syz155240 td->td_maxseg = i; 12982393Syz155240 } 12992393Syz155240 break; 13002393Syz155240 } 13012393Syz155240 } 13022393Syz155240 len -= ol; 13032393Syz155240 s += ol; 13042393Syz155240 } 13052393Syz155240 return retval; 13062393Syz155240 } 13072393Syz155240 13082393Syz155240 13092393Syz155240 /* ------------------------------------------------------------------------ */ 13102393Syz155240 /* Function: fr_tcpstate */ 13112393Syz155240 /* Returns: int - 1 == packet matches state entry, 0 == it does not */ 13122393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 13132393Syz155240 /* tcp(I) - pointer to TCP packet header */ 13142393Syz155240 /* is(I) - pointer to master state structure */ 13152393Syz155240 /* */ 13162393Syz155240 /* Check to see if a packet with TCP headers fits within the TCP window. */ 13172393Syz155240 /* Change timeout depending on whether new packet is a SYN-ACK returning */ 13182393Syz155240 /* for a SYN or a RST or FIN which indicate time to close up shop. */ 13192393Syz155240 /* ------------------------------------------------------------------------ */ 13202393Syz155240 static int fr_tcpstate(fin, tcp, is) 13212393Syz155240 fr_info_t *fin; 13222393Syz155240 tcphdr_t *tcp; 13232393Syz155240 ipstate_t *is; 13242393Syz155240 { 13252393Syz155240 int source, ret = 0, flags; 13262393Syz155240 tcpdata_t *fdata, *tdata; 13273448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 13282393Syz155240 13292393Syz155240 source = !fin->fin_rev; 13302393Syz155240 if (((is->is_flags & IS_TCPFSM) != 0) && (source == 1) && 13312393Syz155240 (ntohs(is->is_sport) != fin->fin_data[0])) 13322393Syz155240 source = 0; 13332393Syz155240 fdata = &is->is_tcp.ts_data[!source]; 13342393Syz155240 tdata = &is->is_tcp.ts_data[source]; 13352393Syz155240 13362393Syz155240 MUTEX_ENTER(&is->is_lock); 1337*4431San207044 1338*4431San207044 /* 1339*4431San207044 * If a SYN packet is received for a connection that is in a half 1340*4431San207044 * closed state, then move its state entry to deletetq. In such case 1341*4431San207044 * the SYN packet will be consequently dropped. This allows new state 1342*4431San207044 * entry to be created with a retransmited SYN packet. 1343*4431San207044 */ 1344*4431San207044 if ((tcp->th_flags & TH_OPENING) == TH_SYN) { 1345*4431San207044 if (((is->is_state[source] > IPF_TCPS_ESTABLISHED) || 1346*4431San207044 (is->is_state[source] == IPF_TCPS_CLOSED)) && 1347*4431San207044 ((is->is_state[!source] > IPF_TCPS_ESTABLISHED) || 1348*4431San207044 (is->is_state[!source] == IPF_TCPS_CLOSED))) { 1349*4431San207044 /* 1350*4431San207044 * Do not update is->is_sti.tqe_die in case state entry 1351*4431San207044 * is already present in deletetq. It prevents state 1352*4431San207044 * entry ttl update by retransmitted SYN packets, which 1353*4431San207044 * may arrive before timer tick kicks off. The SYN 1354*4431San207044 * packet will be dropped again. 1355*4431San207044 */ 1356*4431San207044 if (is->is_sti.tqe_ifq != &ifs->ifs_ips_deletetq) 1357*4431San207044 fr_movequeue(&is->is_sti, is->is_sti.tqe_ifq, 1358*4431San207044 &fin->fin_ifs->ifs_ips_deletetq, 1359*4431San207044 fin->fin_ifs); 1360*4431San207044 1361*4431San207044 MUTEX_EXIT(&is->is_lock); 1362*4431San207044 return 0; 1363*4431San207044 } 1364*4431San207044 } 1365*4431San207044 13662393Syz155240 if (fr_tcpinwindow(fin, fdata, tdata, tcp, is->is_flags)) { 13672393Syz155240 #ifdef IPFILTER_SCAN 13682393Syz155240 if (is->is_flags & (IS_SC_CLIENT|IS_SC_SERVER)) { 13692393Syz155240 ipsc_packet(fin, is); 13702393Syz155240 if (FR_ISBLOCK(is->is_pass)) { 13712393Syz155240 MUTEX_EXIT(&is->is_lock); 13722393Syz155240 return 1; 13732393Syz155240 } 13742393Syz155240 } 13752393Syz155240 #endif 13762393Syz155240 13772393Syz155240 /* 13782393Syz155240 * Nearing end of connection, start timeout. 13792393Syz155240 */ 13803448Sdh155122 ret = fr_tcp_age(&is->is_sti, fin, ifs->ifs_ips_tqtqb, 13813448Sdh155122 is->is_flags); 13822393Syz155240 if (ret == 0) { 13832393Syz155240 MUTEX_EXIT(&is->is_lock); 13842393Syz155240 return 0; 13852393Syz155240 } 13862393Syz155240 13872393Syz155240 /* 13882393Syz155240 * set s0's as appropriate. Use syn-ack packet as it 13892393Syz155240 * contains both pieces of required information. 13902393Syz155240 */ 13912393Syz155240 /* 13922393Syz155240 * Window scale option is only present in SYN/SYN-ACK packet. 13932393Syz155240 * Compare with ~TH_FIN to mask out T/TCP setups. 13942393Syz155240 */ 13952393Syz155240 flags = tcp->th_flags & ~(TH_FIN|TH_ECNALL); 13962393Syz155240 if (flags == (TH_SYN|TH_ACK)) { 13972393Syz155240 is->is_s0[source] = ntohl(tcp->th_ack); 13982393Syz155240 is->is_s0[!source] = ntohl(tcp->th_seq) + 1; 13992393Syz155240 if ((TCP_OFF(tcp) > (sizeof(tcphdr_t) >> 2)) && 14002393Syz155240 tdata->td_winscale) { 14012393Syz155240 if (fr_tcpoptions(fin, tcp, fdata)) { 14022393Syz155240 fdata->td_winflags = TCP_WSCALE_SEEN| 14032393Syz155240 TCP_WSCALE_FIRST; 14042393Syz155240 } else { 14052393Syz155240 if (!fdata->td_winscale) 14062393Syz155240 tdata->td_winscale = 0; 14072393Syz155240 } 14082393Syz155240 } 14092393Syz155240 if ((fin->fin_out != 0) && (is->is_pass & FR_NEWISN)) 14102393Syz155240 fr_checknewisn(fin, is); 14112393Syz155240 } else if (flags == TH_SYN) { 14122393Syz155240 is->is_s0[source] = ntohl(tcp->th_seq) + 1; 14132393Syz155240 if ((TCP_OFF(tcp) > (sizeof(tcphdr_t) >> 2))) 14142393Syz155240 if (fr_tcpoptions(fin, tcp, tdata)) { 14152393Syz155240 tdata->td_winflags = TCP_WSCALE_SEEN| 14162393Syz155240 TCP_WSCALE_FIRST; 14172393Syz155240 } 14182393Syz155240 14192393Syz155240 if ((fin->fin_out != 0) && (is->is_pass & FR_NEWISN)) 14202393Syz155240 fr_checknewisn(fin, is); 14212393Syz155240 14222393Syz155240 } 14232393Syz155240 ret = 1; 14242393Syz155240 } else 14252393Syz155240 fin->fin_flx |= FI_OOW; 14262393Syz155240 MUTEX_EXIT(&is->is_lock); 14272393Syz155240 return ret; 14282393Syz155240 } 14292393Syz155240 14302393Syz155240 14312393Syz155240 /* ------------------------------------------------------------------------ */ 14322393Syz155240 /* Function: fr_checknewisn */ 14332393Syz155240 /* Returns: Nil */ 14342393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 14352393Syz155240 /* is(I) - pointer to master state structure */ 14362393Syz155240 /* */ 14372393Syz155240 /* Check to see if this TCP connection is expecting and needs a new */ 14382393Syz155240 /* sequence number for a particular direction of the connection. */ 14392393Syz155240 /* */ 14402393Syz155240 /* NOTE: This does not actually change the sequence numbers, only gets new */ 14412393Syz155240 /* one ready. */ 14422393Syz155240 /* ------------------------------------------------------------------------ */ 14432393Syz155240 static void fr_checknewisn(fin, is) 14442393Syz155240 fr_info_t *fin; 14452393Syz155240 ipstate_t *is; 14462393Syz155240 { 14472393Syz155240 u_32_t sumd, old, new; 14482393Syz155240 tcphdr_t *tcp; 14492393Syz155240 int i; 14502393Syz155240 14512393Syz155240 i = fin->fin_rev; 14522393Syz155240 tcp = fin->fin_dp; 14532393Syz155240 14542393Syz155240 if (((i == 0) && !(is->is_flags & IS_ISNSYN)) || 14552393Syz155240 ((i == 1) && !(is->is_flags & IS_ISNACK))) { 14562393Syz155240 old = ntohl(tcp->th_seq); 14572393Syz155240 new = fr_newisn(fin); 14582393Syz155240 is->is_isninc[i] = new - old; 14592393Syz155240 CALC_SUMD(old, new, sumd); 14602393Syz155240 is->is_sumd[i] = (sumd & 0xffff) + (sumd >> 16); 14612393Syz155240 14622393Syz155240 is->is_flags |= ((i == 0) ? IS_ISNSYN : IS_ISNACK); 14632393Syz155240 } 14642393Syz155240 } 14652393Syz155240 14662393Syz155240 14672393Syz155240 /* ------------------------------------------------------------------------ */ 14682393Syz155240 /* Function: fr_tcpinwindow */ 14692393Syz155240 /* Returns: int - 1 == packet inside TCP "window", 0 == not inside. */ 14702393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 14712393Syz155240 /* fdata(I) - pointer to tcp state informatio (forward) */ 14722393Syz155240 /* tdata(I) - pointer to tcp state informatio (reverse) */ 14732393Syz155240 /* tcp(I) - pointer to TCP packet header */ 14742393Syz155240 /* */ 14752393Syz155240 /* Given a packet has matched addresses and ports, check to see if it is */ 14762393Syz155240 /* within the TCP data window. In a show of generosity, allow packets that */ 14772393Syz155240 /* are within the window space behind the current sequence # as well. */ 14782393Syz155240 /* ------------------------------------------------------------------------ */ 14792393Syz155240 int fr_tcpinwindow(fin, fdata, tdata, tcp, flags) 14802393Syz155240 fr_info_t *fin; 14812393Syz155240 tcpdata_t *fdata, *tdata; 14822393Syz155240 tcphdr_t *tcp; 14832393Syz155240 int flags; 14842393Syz155240 { 14852393Syz155240 tcp_seq seq, ack, end; 14862393Syz155240 int ackskew, tcpflags; 14872393Syz155240 u_32_t win, maxwin; 14882393Syz155240 14892393Syz155240 /* 14902393Syz155240 * Find difference between last checked packet and this packet. 14912393Syz155240 */ 14922393Syz155240 tcpflags = tcp->th_flags; 14932393Syz155240 seq = ntohl(tcp->th_seq); 14942393Syz155240 ack = ntohl(tcp->th_ack); 14952393Syz155240 if (tcpflags & TH_SYN) 14962393Syz155240 win = ntohs(tcp->th_win); 14972393Syz155240 else 14982393Syz155240 win = ntohs(tcp->th_win) << fdata->td_winscale; 14992393Syz155240 if (win == 0) 15002393Syz155240 win = 1; 15012393Syz155240 15022393Syz155240 /* 15032393Syz155240 * if window scaling is present, the scaling is only allowed 15042393Syz155240 * for windows not in the first SYN packet. In that packet the 15052393Syz155240 * window is 65535 to specify the largest window possible 15062393Syz155240 * for receivers not implementing the window scale option. 15072393Syz155240 * Currently, we do not assume TTCP here. That means that 15082393Syz155240 * if we see a second packet from a host (after the initial 15092393Syz155240 * SYN), we can assume that the receiver of the SYN did 15102393Syz155240 * already send back the SYN/ACK (and thus that we know if 15112393Syz155240 * the receiver also does window scaling) 15122393Syz155240 */ 15132393Syz155240 if (!(tcpflags & TH_SYN) && (fdata->td_winflags & TCP_WSCALE_FIRST)) { 15142393Syz155240 if (tdata->td_winflags & TCP_WSCALE_SEEN) { 15152393Syz155240 fdata->td_winflags &= ~TCP_WSCALE_FIRST; 15162393Syz155240 fdata->td_maxwin = win; 15172393Syz155240 } else { 15182393Syz155240 fdata->td_winscale = 0; 15192393Syz155240 fdata->td_winflags = 0; 15202393Syz155240 tdata->td_winscale = 0; 15212393Syz155240 tdata->td_winflags = 0; 15222393Syz155240 } 15232393Syz155240 } 15242393Syz155240 15252393Syz155240 end = seq + fin->fin_dlen - (TCP_OFF(tcp) << 2) + 15262393Syz155240 ((tcpflags & TH_SYN) ? 1 : 0) + ((tcpflags & TH_FIN) ? 1 : 0); 15272393Syz155240 15282393Syz155240 if ((fdata->td_end == 0) && 15292393Syz155240 (!(flags & IS_TCPFSM) || 15302393Syz155240 ((tcpflags & TH_OPENING) == TH_OPENING))) { 15312393Syz155240 /* 15322393Syz155240 * Must be a (outgoing) SYN-ACK in reply to a SYN. 15332393Syz155240 */ 15342393Syz155240 fdata->td_end = end; 15352393Syz155240 fdata->td_maxwin = 1; 15362393Syz155240 fdata->td_maxend = end + win; 15372393Syz155240 } 15382393Syz155240 15392393Syz155240 if (!(tcpflags & TH_ACK)) { /* Pretend an ack was sent */ 15402393Syz155240 ack = tdata->td_end; 15412393Syz155240 } else if (((tcpflags & (TH_ACK|TH_RST)) == (TH_ACK|TH_RST)) && 15422393Syz155240 (ack == 0)) { 15432393Syz155240 /* gross hack to get around certain broken tcp stacks */ 15442393Syz155240 ack = tdata->td_end; 15452393Syz155240 } 15462393Syz155240 15472393Syz155240 if (seq == end) 15482393Syz155240 seq = end = fdata->td_end; 15492393Syz155240 15502393Syz155240 maxwin = tdata->td_maxwin; 15512393Syz155240 ackskew = tdata->td_end - ack; 15522393Syz155240 15532393Syz155240 /* 15542393Syz155240 * Strict sequencing only allows in-order delivery. 15552393Syz155240 */ 15562393Syz155240 if ((flags & IS_STRICT) != 0) { 15572393Syz155240 if (seq != fdata->td_end) { 15582393Syz155240 return 0; 15592393Syz155240 } 15602393Syz155240 } 15612393Syz155240 15622393Syz155240 #define SEQ_GE(a,b) ((int)((a) - (b)) >= 0) 15632393Syz155240 #define SEQ_GT(a,b) ((int)((a) - (b)) > 0) 15642393Syz155240 if ( 15652393Syz155240 #if defined(_KERNEL) 15662393Syz155240 (SEQ_GE(fdata->td_maxend, end)) && 15672393Syz155240 (SEQ_GE(seq, fdata->td_end - maxwin)) && 15682393Syz155240 #endif 15692393Syz155240 /* XXX what about big packets */ 15702393Syz155240 #define MAXACKWINDOW 66000 15712393Syz155240 (-ackskew <= (MAXACKWINDOW << fdata->td_winscale)) && 15722393Syz155240 ( ackskew <= (MAXACKWINDOW << fdata->td_winscale))) { 15732393Syz155240 15742393Syz155240 /* if ackskew < 0 then this should be due to fragmented 15752393Syz155240 * packets. There is no way to know the length of the 15762393Syz155240 * total packet in advance. 15772393Syz155240 * We do know the total length from the fragment cache though. 15782393Syz155240 * Note however that there might be more sessions with 15792393Syz155240 * exactly the same source and destination parameters in the 15802393Syz155240 * state cache (and source and destination is the only stuff 15812393Syz155240 * that is saved in the fragment cache). Note further that 15822393Syz155240 * some TCP connections in the state cache are hashed with 15832393Syz155240 * sport and dport as well which makes it not worthwhile to 15842393Syz155240 * look for them. 15852393Syz155240 * Thus, when ackskew is negative but still seems to belong 15862393Syz155240 * to this session, we bump up the destinations end value. 15872393Syz155240 */ 15882393Syz155240 if (ackskew < 0) 15892393Syz155240 tdata->td_end = ack; 15902393Syz155240 15912393Syz155240 /* update max window seen */ 15922393Syz155240 if (fdata->td_maxwin < win) 15932393Syz155240 fdata->td_maxwin = win; 15942393Syz155240 if (SEQ_GT(end, fdata->td_end)) 15952393Syz155240 fdata->td_end = end; 15962393Syz155240 if (SEQ_GE(ack + win, tdata->td_maxend)) 15972393Syz155240 tdata->td_maxend = ack + win; 15982393Syz155240 return 1; 15992393Syz155240 } 16002393Syz155240 return 0; 16012393Syz155240 } 16022393Syz155240 16032393Syz155240 16042393Syz155240 /* ------------------------------------------------------------------------ */ 16052393Syz155240 /* Function: fr_stclone */ 16062393Syz155240 /* Returns: ipstate_t* - NULL == cloning failed, */ 16072393Syz155240 /* else pointer to new state structure */ 16082393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 16092393Syz155240 /* tcp(I) - pointer to TCP/UDP header */ 16102393Syz155240 /* is(I) - pointer to master state structure */ 16112393Syz155240 /* */ 16122393Syz155240 /* Create a "duplcate" state table entry from the master. */ 16132393Syz155240 /* ------------------------------------------------------------------------ */ 16142393Syz155240 static ipstate_t *fr_stclone(fin, tcp, is) 16152393Syz155240 fr_info_t *fin; 16162393Syz155240 tcphdr_t *tcp; 16172393Syz155240 ipstate_t *is; 16182393Syz155240 { 16192393Syz155240 ipstate_t *clone; 16202393Syz155240 u_32_t send; 16213448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 16223448Sdh155122 16233448Sdh155122 if (ifs->ifs_ips_num == ifs->ifs_fr_statemax) { 16243448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_max); 16253448Sdh155122 ifs->ifs_fr_state_doflush = 1; 16262393Syz155240 return NULL; 16272393Syz155240 } 16282393Syz155240 KMALLOC(clone, ipstate_t *); 16292393Syz155240 if (clone == NULL) 16302393Syz155240 return NULL; 16312393Syz155240 bcopy((char *)is, (char *)clone, sizeof(*clone)); 16322393Syz155240 16332393Syz155240 MUTEX_NUKE(&clone->is_lock); 16342393Syz155240 16353448Sdh155122 clone->is_die = ONE_DAY + ifs->ifs_fr_ticks; 16362393Syz155240 clone->is_state[0] = 0; 16372393Syz155240 clone->is_state[1] = 0; 16382393Syz155240 send = ntohl(tcp->th_seq) + fin->fin_dlen - (TCP_OFF(tcp) << 2) + 16392393Syz155240 ((tcp->th_flags & TH_SYN) ? 1 : 0) + 16402393Syz155240 ((tcp->th_flags & TH_FIN) ? 1 : 0); 16412393Syz155240 16422393Syz155240 if (fin->fin_rev == 1) { 16432393Syz155240 clone->is_dend = send; 16442393Syz155240 clone->is_maxdend = send; 16452393Syz155240 clone->is_send = 0; 16462393Syz155240 clone->is_maxswin = 1; 16472393Syz155240 clone->is_maxdwin = ntohs(tcp->th_win); 16482393Syz155240 if (clone->is_maxdwin == 0) 16492393Syz155240 clone->is_maxdwin = 1; 16502393Syz155240 } else { 16512393Syz155240 clone->is_send = send; 16522393Syz155240 clone->is_maxsend = send; 16532393Syz155240 clone->is_dend = 0; 16542393Syz155240 clone->is_maxdwin = 1; 16552393Syz155240 clone->is_maxswin = ntohs(tcp->th_win); 16562393Syz155240 if (clone->is_maxswin == 0) 16572393Syz155240 clone->is_maxswin = 1; 16582393Syz155240 } 16592393Syz155240 16602393Syz155240 clone->is_flags &= ~SI_CLONE; 16612393Syz155240 clone->is_flags |= SI_CLONED; 16623448Sdh155122 fr_stinsert(clone, fin->fin_rev, ifs); 16632393Syz155240 clone->is_ref = 2; 16642393Syz155240 if (clone->is_p == IPPROTO_TCP) { 16653448Sdh155122 (void) fr_tcp_age(&clone->is_sti, fin, ifs->ifs_ips_tqtqb, 16662393Syz155240 clone->is_flags); 16672393Syz155240 } 16682393Syz155240 MUTEX_EXIT(&clone->is_lock); 16692393Syz155240 #ifdef IPFILTER_SCAN 16702393Syz155240 (void) ipsc_attachis(is); 16712393Syz155240 #endif 16722393Syz155240 #ifdef IPFILTER_SYNC 16732393Syz155240 if (is->is_flags & IS_STATESYNC) 16742393Syz155240 clone->is_sync = ipfsync_new(SMC_STATE, fin, clone); 16752393Syz155240 #endif 16762393Syz155240 return clone; 16772393Syz155240 } 16782393Syz155240 16792393Syz155240 16802393Syz155240 /* ------------------------------------------------------------------------ */ 16812393Syz155240 /* Function: fr_matchsrcdst */ 16822393Syz155240 /* Returns: Nil */ 16832393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 16842393Syz155240 /* is(I) - pointer to state structure */ 16852393Syz155240 /* src(I) - pointer to source address */ 16862393Syz155240 /* dst(I) - pointer to destination address */ 16872393Syz155240 /* tcp(I) - pointer to TCP/UDP header */ 16882393Syz155240 /* */ 16892393Syz155240 /* Match a state table entry against an IP packet. The logic below is that */ 16902393Syz155240 /* ret gets set to one if the match succeeds, else remains 0. If it is */ 16912393Syz155240 /* still 0 after the test. no match. */ 16922393Syz155240 /* ------------------------------------------------------------------------ */ 16932393Syz155240 static ipstate_t *fr_matchsrcdst(fin, is, src, dst, tcp, cmask) 16942393Syz155240 fr_info_t *fin; 16952393Syz155240 ipstate_t *is; 16962393Syz155240 i6addr_t *src, *dst; 16972393Syz155240 tcphdr_t *tcp; 16982393Syz155240 u_32_t cmask; 16992393Syz155240 { 17002393Syz155240 int ret = 0, rev, out, flags, flx = 0, idx; 17012393Syz155240 u_short sp, dp; 17022393Syz155240 u_32_t cflx; 17032393Syz155240 void *ifp; 17043448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 17052393Syz155240 17062393Syz155240 rev = IP6_NEQ(&is->is_dst, dst); 17072393Syz155240 ifp = fin->fin_ifp; 17082393Syz155240 out = fin->fin_out; 17092393Syz155240 flags = is->is_flags; 17102393Syz155240 sp = 0; 17112393Syz155240 dp = 0; 17122393Syz155240 17132393Syz155240 if (tcp != NULL) { 17142393Syz155240 sp = htons(fin->fin_sport); 17152393Syz155240 dp = ntohs(fin->fin_dport); 17162393Syz155240 } 17172393Syz155240 if (!rev) { 17182393Syz155240 if (tcp != NULL) { 17192393Syz155240 if (!(flags & SI_W_SPORT) && (sp != is->is_sport)) 17202393Syz155240 rev = 1; 17212393Syz155240 else if (!(flags & SI_W_DPORT) && (dp != is->is_dport)) 17222393Syz155240 rev = 1; 17232393Syz155240 } 17242393Syz155240 } 17252393Syz155240 17262393Syz155240 idx = (out << 1) + rev; 17272393Syz155240 17282393Syz155240 /* 17292393Syz155240 * If the interface for this 'direction' is set, make sure it matches. 17302393Syz155240 * An interface name that is not set matches any, as does a name of *. 17312393Syz155240 */ 17322393Syz155240 if ((is->is_ifp[idx] == NULL && 17332393Syz155240 (*is->is_ifname[idx] == '\0' || *is->is_ifname[idx] == '*')) || 17342393Syz155240 is->is_ifp[idx] == ifp) 17352393Syz155240 ret = 1; 17362393Syz155240 17372393Syz155240 if (ret == 0) 17382393Syz155240 return NULL; 17392393Syz155240 ret = 0; 17402393Syz155240 17412393Syz155240 /* 17422393Syz155240 * Match addresses and ports. 17432393Syz155240 */ 17442393Syz155240 if (rev == 0) { 17452393Syz155240 if ((IP6_EQ(&is->is_dst, dst) || (flags & SI_W_DADDR)) && 17462393Syz155240 (IP6_EQ(&is->is_src, src) || (flags & SI_W_SADDR))) { 17472393Syz155240 if (tcp) { 17482393Syz155240 if ((sp == is->is_sport || flags & SI_W_SPORT)&& 17492393Syz155240 (dp == is->is_dport || flags & SI_W_DPORT)) 17502393Syz155240 ret = 1; 17512393Syz155240 } else { 17522393Syz155240 ret = 1; 17532393Syz155240 } 17542393Syz155240 } 17552393Syz155240 } else { 17562393Syz155240 if ((IP6_EQ(&is->is_dst, src) || (flags & SI_W_DADDR)) && 17572393Syz155240 (IP6_EQ(&is->is_src, dst) || (flags & SI_W_SADDR))) { 17582393Syz155240 if (tcp) { 17592393Syz155240 if ((dp == is->is_sport || flags & SI_W_SPORT)&& 17602393Syz155240 (sp == is->is_dport || flags & SI_W_DPORT)) 17612393Syz155240 ret = 1; 17622393Syz155240 } else { 17632393Syz155240 ret = 1; 17642393Syz155240 } 17652393Syz155240 } 17662393Syz155240 } 17672393Syz155240 17682393Syz155240 if (ret == 0) 17692393Syz155240 return NULL; 17702393Syz155240 17712393Syz155240 /* 17722393Syz155240 * Whether or not this should be here, is questionable, but the aim 17732393Syz155240 * is to get this out of the main line. 17742393Syz155240 */ 17752393Syz155240 if (tcp == NULL) 17762393Syz155240 flags = is->is_flags & ~(SI_WILDP|SI_NEWFR|SI_CLONE|SI_CLONED); 17772393Syz155240 17782393Syz155240 /* 17792393Syz155240 * Only one of the source or destination address can be flaged as a 17802393Syz155240 * wildcard. Fill in the missing address, if set. 17812393Syz155240 * For IPv6, if the address being copied in is multicast, then 17822393Syz155240 * don't reset the wild flag - multicast causes it to be set in the 17832393Syz155240 * first place! 17842393Syz155240 */ 17852393Syz155240 if ((flags & (SI_W_SADDR|SI_W_DADDR))) { 17862393Syz155240 fr_ip_t *fi = &fin->fin_fi; 17872393Syz155240 17882393Syz155240 if ((flags & SI_W_SADDR) != 0) { 17892393Syz155240 if (rev == 0) { 17902393Syz155240 #ifdef USE_INET6 17912393Syz155240 if (is->is_v == 6 && 17922393Syz155240 IN6_IS_ADDR_MULTICAST(&fi->fi_src.in6)) 17932393Syz155240 /*EMPTY*/; 17942393Syz155240 else 17952393Syz155240 #endif 17962393Syz155240 { 17972393Syz155240 is->is_src = fi->fi_src; 17982393Syz155240 is->is_flags &= ~SI_W_SADDR; 17992393Syz155240 } 18002393Syz155240 } else { 18012393Syz155240 #ifdef USE_INET6 18022393Syz155240 if (is->is_v == 6 && 18032393Syz155240 IN6_IS_ADDR_MULTICAST(&fi->fi_dst.in6)) 18042393Syz155240 /*EMPTY*/; 18052393Syz155240 else 18062393Syz155240 #endif 18072393Syz155240 { 18082393Syz155240 is->is_src = fi->fi_dst; 18092393Syz155240 is->is_flags &= ~SI_W_SADDR; 18102393Syz155240 } 18112393Syz155240 } 18122393Syz155240 } else if ((flags & SI_W_DADDR) != 0) { 18132393Syz155240 if (rev == 0) { 18142393Syz155240 #ifdef USE_INET6 18152393Syz155240 if (is->is_v == 6 && 18162393Syz155240 IN6_IS_ADDR_MULTICAST(&fi->fi_dst.in6)) 18172393Syz155240 /*EMPTY*/; 18182393Syz155240 else 18192393Syz155240 #endif 18202393Syz155240 { 18212393Syz155240 is->is_dst = fi->fi_dst; 18222393Syz155240 is->is_flags &= ~SI_W_DADDR; 18232393Syz155240 } 18242393Syz155240 } else { 18252393Syz155240 #ifdef USE_INET6 18262393Syz155240 if (is->is_v == 6 && 18272393Syz155240 IN6_IS_ADDR_MULTICAST(&fi->fi_src.in6)) 18282393Syz155240 /*EMPTY*/; 18292393Syz155240 else 18302393Syz155240 #endif 18312393Syz155240 { 18322393Syz155240 is->is_dst = fi->fi_src; 18332393Syz155240 is->is_flags &= ~SI_W_DADDR; 18342393Syz155240 } 18352393Syz155240 } 18362393Syz155240 } 18372393Syz155240 if ((is->is_flags & (SI_WILDA|SI_WILDP)) == 0) { 18383448Sdh155122 ATOMIC_DECL(ifs->ifs_ips_stats.iss_wild); 18392393Syz155240 } 18402393Syz155240 } 18412393Syz155240 18422393Syz155240 flx = fin->fin_flx & cmask; 18432393Syz155240 cflx = is->is_flx[out][rev]; 18442393Syz155240 18452393Syz155240 /* 18462393Syz155240 * Match up any flags set from IP options. 18472393Syz155240 */ 18482393Syz155240 if ((cflx && (flx != (cflx & cmask))) || 18492393Syz155240 ((fin->fin_optmsk & is->is_optmsk[rev]) != is->is_opt[rev]) || 18502393Syz155240 ((fin->fin_secmsk & is->is_secmsk) != is->is_sec) || 18512393Syz155240 ((fin->fin_auth & is->is_authmsk) != is->is_auth)) 18522393Syz155240 return NULL; 18532393Syz155240 18542393Syz155240 /* 18552393Syz155240 * Only one of the source or destination port can be flagged as a 18562393Syz155240 * wildcard. When filling it in, fill in a copy of the matched entry 18572393Syz155240 * if it has the cloning flag set. 18582393Syz155240 */ 18592393Syz155240 if ((fin->fin_flx & FI_IGNORE) != 0) { 18602393Syz155240 fin->fin_rev = rev; 18612393Syz155240 return is; 18622393Syz155240 } 18632393Syz155240 18642393Syz155240 if ((flags & (SI_W_SPORT|SI_W_DPORT))) { 18652393Syz155240 if ((flags & SI_CLONE) != 0) { 18662393Syz155240 ipstate_t *clone; 18672393Syz155240 18682393Syz155240 clone = fr_stclone(fin, tcp, is); 18692393Syz155240 if (clone == NULL) 18702393Syz155240 return NULL; 18712393Syz155240 is = clone; 18722393Syz155240 } else { 18733448Sdh155122 ATOMIC_DECL(ifs->ifs_ips_stats.iss_wild); 18742393Syz155240 } 18752393Syz155240 18762393Syz155240 if ((flags & SI_W_SPORT) != 0) { 18772393Syz155240 if (rev == 0) { 18782393Syz155240 is->is_sport = sp; 18792393Syz155240 is->is_send = ntohl(tcp->th_seq); 18802393Syz155240 } else { 18812393Syz155240 is->is_sport = dp; 18822393Syz155240 is->is_send = ntohl(tcp->th_ack); 18832393Syz155240 } 18842393Syz155240 is->is_maxsend = is->is_send + 1; 18852393Syz155240 } else if ((flags & SI_W_DPORT) != 0) { 18862393Syz155240 if (rev == 0) { 18872393Syz155240 is->is_dport = dp; 18882393Syz155240 is->is_dend = ntohl(tcp->th_ack); 18892393Syz155240 } else { 18902393Syz155240 is->is_dport = sp; 18912393Syz155240 is->is_dend = ntohl(tcp->th_seq); 18922393Syz155240 } 18932393Syz155240 is->is_maxdend = is->is_dend + 1; 18942393Syz155240 } 18952393Syz155240 is->is_flags &= ~(SI_W_SPORT|SI_W_DPORT); 18963448Sdh155122 if ((flags & SI_CLONED) && ifs->ifs_ipstate_logging) 18973448Sdh155122 ipstate_log(is, ISL_CLONE, ifs); 18982393Syz155240 } 18992393Syz155240 19002393Syz155240 ret = -1; 19012393Syz155240 19022393Syz155240 if (is->is_flx[out][rev] == 0) { 19032393Syz155240 is->is_flx[out][rev] = flx; 19042393Syz155240 is->is_opt[rev] = fin->fin_optmsk; 19052393Syz155240 if (is->is_v == 6) { 19062393Syz155240 is->is_opt[rev] &= ~0x8; 19072393Syz155240 is->is_optmsk[rev] &= ~0x8; 19082393Syz155240 } 19092393Syz155240 } 19102393Syz155240 19112393Syz155240 /* 19122393Syz155240 * Check if the interface name for this "direction" is set and if not, 19132393Syz155240 * fill it in. 19142393Syz155240 */ 19152393Syz155240 if (is->is_ifp[idx] == NULL && 19162393Syz155240 (*is->is_ifname[idx] == '\0' || *is->is_ifname[idx] == '*')) { 19172393Syz155240 is->is_ifp[idx] = ifp; 19182958Sdr146992 COPYIFNAME(ifp, is->is_ifname[idx], fin->fin_v); 19192393Syz155240 } 19202393Syz155240 fin->fin_rev = rev; 19212393Syz155240 return is; 19222393Syz155240 } 19232393Syz155240 19242393Syz155240 19252393Syz155240 /* ------------------------------------------------------------------------ */ 19262393Syz155240 /* Function: fr_checkicmpmatchingstate */ 19272393Syz155240 /* Returns: Nil */ 19282393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 19292393Syz155240 /* */ 19302393Syz155240 /* If we've got an ICMP error message, using the information stored in the */ 19312393Syz155240 /* ICMP packet, look for a matching state table entry. */ 19322393Syz155240 /* */ 19332393Syz155240 /* If we return NULL then no lock on ipf_state is held. */ 19342393Syz155240 /* If we return non-null then a read-lock on ipf_state is held. */ 19352393Syz155240 /* ------------------------------------------------------------------------ */ 19362393Syz155240 static ipstate_t *fr_checkicmpmatchingstate(fin) 19372393Syz155240 fr_info_t *fin; 19382393Syz155240 { 19392393Syz155240 ipstate_t *is, **isp; 19402393Syz155240 u_short sport, dport; 19412393Syz155240 u_char pr; 19422393Syz155240 int backward, i, oi; 19432393Syz155240 i6addr_t dst, src; 19442393Syz155240 struct icmp *ic; 19452393Syz155240 u_short savelen; 19462393Syz155240 icmphdr_t *icmp; 19472393Syz155240 fr_info_t ofin; 19482393Syz155240 tcphdr_t *tcp; 19492393Syz155240 int len; 19502393Syz155240 ip_t *oip; 19512393Syz155240 u_int hv; 19523448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 19532393Syz155240 19542393Syz155240 /* 19552393Syz155240 * Does it at least have the return (basic) IP header ? 19562393Syz155240 * Is it an actual recognised ICMP error type? 19572393Syz155240 * Only a basic IP header (no options) should be with 19582393Syz155240 * an ICMP error header. 19592393Syz155240 */ 19602393Syz155240 if ((fin->fin_v != 4) || (fin->fin_hlen != sizeof(ip_t)) || 19612393Syz155240 (fin->fin_plen < ICMPERR_MINPKTLEN) || 19622393Syz155240 !(fin->fin_flx & FI_ICMPERR)) 19632393Syz155240 return NULL; 19642393Syz155240 ic = fin->fin_dp; 19652393Syz155240 19662393Syz155240 oip = (ip_t *)((char *)ic + ICMPERR_ICMPHLEN); 19672393Syz155240 /* 19682393Syz155240 * Check if the at least the old IP header (with options) and 19692393Syz155240 * 8 bytes of payload is present. 19702393Syz155240 */ 19712393Syz155240 if (fin->fin_plen < ICMPERR_MAXPKTLEN + ((IP_HL(oip) - 5) << 2)) 19722393Syz155240 return NULL; 19732393Syz155240 19742393Syz155240 /* 19752393Syz155240 * Sanity Checks. 19762393Syz155240 */ 19772393Syz155240 len = fin->fin_dlen - ICMPERR_ICMPHLEN; 19782393Syz155240 if ((len <= 0) || ((IP_HL(oip) << 2) > len)) 19792393Syz155240 return NULL; 19802393Syz155240 19812393Syz155240 /* 19822393Syz155240 * Is the buffer big enough for all of it ? It's the size of the IP 19832393Syz155240 * header claimed in the encapsulated part which is of concern. It 19842393Syz155240 * may be too big to be in this buffer but not so big that it's 19852393Syz155240 * outside the ICMP packet, leading to TCP deref's causing problems. 19862393Syz155240 * This is possible because we don't know how big oip_hl is when we 19872393Syz155240 * do the pullup early in fr_check() and thus can't guarantee it is 19882393Syz155240 * all here now. 19892393Syz155240 */ 19902393Syz155240 #ifdef _KERNEL 19912393Syz155240 { 19922393Syz155240 mb_t *m; 19932393Syz155240 19942393Syz155240 m = fin->fin_m; 19952393Syz155240 # if defined(MENTAT) 19962393Syz155240 if ((char *)oip + len > (char *)m->b_wptr) 19972393Syz155240 return NULL; 19982393Syz155240 # else 19992393Syz155240 if ((char *)oip + len > (char *)fin->fin_ip + m->m_len) 20002393Syz155240 return NULL; 20012393Syz155240 # endif 20022393Syz155240 } 20032393Syz155240 #endif 20043607Szf203873 bcopy((char *)fin, (char *)&ofin, sizeof(*fin)); 20052393Syz155240 20062393Syz155240 /* 20072393Syz155240 * in the IPv4 case we must zero the i6addr union otherwise 20082393Syz155240 * the IP6_EQ and IP6_NEQ macros produce the wrong results because 20092393Syz155240 * of the 'junk' in the unused part of the union 20102393Syz155240 */ 20112393Syz155240 bzero((char *)&src, sizeof(src)); 20122393Syz155240 bzero((char *)&dst, sizeof(dst)); 20132393Syz155240 20142393Syz155240 /* 20152393Syz155240 * we make an fin entry to be able to feed it to 20162393Syz155240 * matchsrcdst note that not all fields are encessary 20172393Syz155240 * but this is the cleanest way. Note further we fill 20182393Syz155240 * in fin_mp such that if someone uses it we'll get 20192393Syz155240 * a kernel panic. fr_matchsrcdst does not use this. 20202393Syz155240 * 20212393Syz155240 * watch out here, as ip is in host order and oip in network 20222393Syz155240 * order. Any change we make must be undone afterwards, like 20232393Syz155240 * oip->ip_off - it is still in network byte order so fix it. 20242393Syz155240 */ 20252393Syz155240 savelen = oip->ip_len; 20262393Syz155240 oip->ip_len = len; 20272393Syz155240 oip->ip_off = ntohs(oip->ip_off); 20282393Syz155240 20292393Syz155240 ofin.fin_flx = FI_NOCKSUM; 20302393Syz155240 ofin.fin_v = 4; 20312393Syz155240 ofin.fin_ip = oip; 20322393Syz155240 ofin.fin_m = NULL; /* if dereferenced, panic XXX */ 20332393Syz155240 ofin.fin_mp = NULL; /* if dereferenced, panic XXX */ 20342393Syz155240 ofin.fin_plen = fin->fin_dlen - ICMPERR_ICMPHLEN; 20352393Syz155240 (void) fr_makefrip(IP_HL(oip) << 2, oip, &ofin); 20362393Syz155240 ofin.fin_ifp = fin->fin_ifp; 20372393Syz155240 ofin.fin_out = !fin->fin_out; 20382393Syz155240 /* 20392393Syz155240 * Reset the short and bad flag here because in fr_matchsrcdst() 20402393Syz155240 * the flags for the current packet (fin_flx) are compared against 20412393Syz155240 * those for the existing session. 20422393Syz155240 */ 20432393Syz155240 ofin.fin_flx &= ~(FI_BAD|FI_SHORT); 20442393Syz155240 20452393Syz155240 /* 20462393Syz155240 * Put old values of ip_len and ip_off back as we don't know 20472393Syz155240 * if we have to forward the packet (or process it again. 20482393Syz155240 */ 20492393Syz155240 oip->ip_len = savelen; 20502393Syz155240 oip->ip_off = htons(oip->ip_off); 20512393Syz155240 20522393Syz155240 switch (oip->ip_p) 20532393Syz155240 { 20542393Syz155240 case IPPROTO_ICMP : 20552393Syz155240 /* 20562393Syz155240 * an ICMP error can only be generated as a result of an 20572393Syz155240 * ICMP query, not as the response on an ICMP error 20582393Syz155240 * 20592393Syz155240 * XXX theoretically ICMP_ECHOREP and the other reply's are 20602393Syz155240 * ICMP query's as well, but adding them here seems strange XXX 20612393Syz155240 */ 20622393Syz155240 if ((ofin.fin_flx & FI_ICMPERR) != 0) 20632393Syz155240 return NULL; 20642393Syz155240 20652393Syz155240 /* 20662393Syz155240 * perform a lookup of the ICMP packet in the state table 20672393Syz155240 */ 20682393Syz155240 icmp = (icmphdr_t *)((char *)oip + (IP_HL(oip) << 2)); 20692393Syz155240 hv = (pr = oip->ip_p); 20702393Syz155240 src.in4 = oip->ip_src; 20712393Syz155240 hv += src.in4.s_addr; 20722393Syz155240 dst.in4 = oip->ip_dst; 20732393Syz155240 hv += dst.in4.s_addr; 20742393Syz155240 hv += icmp->icmp_id; 20753448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 20763448Sdh155122 20773448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 20783448Sdh155122 for (isp = &ifs->ifs_ips_table[hv]; ((is = *isp) != NULL); ) { 20792393Syz155240 isp = &is->is_hnext; 20802393Syz155240 if ((is->is_p != pr) || (is->is_v != 4)) 20812393Syz155240 continue; 20822393Syz155240 if (is->is_pass & FR_NOICMPERR) 20832393Syz155240 continue; 20842393Syz155240 is = fr_matchsrcdst(&ofin, is, &src, &dst, 20852393Syz155240 NULL, FI_ICMPCMP); 20862393Syz155240 if (is != NULL) { 20872393Syz155240 if ((is->is_pass & FR_NOICMPERR) != 0) { 20883448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 20892393Syz155240 return NULL; 20902393Syz155240 } 20912393Syz155240 /* 20922393Syz155240 * i : the index of this packet (the icmp 20932393Syz155240 * unreachable) 20942393Syz155240 * oi : the index of the original packet found 20952393Syz155240 * in the icmp header (i.e. the packet 20962393Syz155240 * causing this icmp) 20972393Syz155240 * backward : original packet was backward 20982393Syz155240 * compared to the state 20992393Syz155240 */ 21002393Syz155240 backward = IP6_NEQ(&is->is_src, &src); 21012393Syz155240 fin->fin_rev = !backward; 21022393Syz155240 i = (!backward << 1) + fin->fin_out; 21032393Syz155240 oi = (backward << 1) + ofin.fin_out; 21042393Syz155240 if (is->is_icmppkts[i] > is->is_pkts[oi]) 21052393Syz155240 continue; 21063448Sdh155122 ifs->ifs_ips_stats.iss_hits++; 21072393Syz155240 is->is_icmppkts[i]++; 21082393Syz155240 return is; 21092393Syz155240 } 21102393Syz155240 } 21113448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 21122393Syz155240 return NULL; 21132393Syz155240 case IPPROTO_TCP : 21142393Syz155240 case IPPROTO_UDP : 21152393Syz155240 break; 21162393Syz155240 default : 21172393Syz155240 return NULL; 21182393Syz155240 } 21192393Syz155240 21202393Syz155240 tcp = (tcphdr_t *)((char *)oip + (IP_HL(oip) << 2)); 21212393Syz155240 dport = tcp->th_dport; 21222393Syz155240 sport = tcp->th_sport; 21232393Syz155240 21242393Syz155240 hv = (pr = oip->ip_p); 21252393Syz155240 src.in4 = oip->ip_src; 21262393Syz155240 hv += src.in4.s_addr; 21272393Syz155240 dst.in4 = oip->ip_dst; 21282393Syz155240 hv += dst.in4.s_addr; 21292393Syz155240 hv += dport; 21302393Syz155240 hv += sport; 21313448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 21323448Sdh155122 21333448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 21343448Sdh155122 for (isp = &ifs->ifs_ips_table[hv]; ((is = *isp) != NULL); ) { 21352393Syz155240 isp = &is->is_hnext; 21362393Syz155240 /* 21372393Syz155240 * Only allow this icmp though if the 21382393Syz155240 * encapsulated packet was allowed through the 21392393Syz155240 * other way around. Note that the minimal amount 21402393Syz155240 * of info present does not allow for checking against 21412393Syz155240 * tcp internals such as seq and ack numbers. Only the 21422393Syz155240 * ports are known to be present and can be even if the 21432393Syz155240 * short flag is set. 21442393Syz155240 */ 21452393Syz155240 if ((is->is_p == pr) && (is->is_v == 4) && 21462393Syz155240 (is = fr_matchsrcdst(&ofin, is, &src, &dst, 21472393Syz155240 tcp, FI_ICMPCMP))) { 21482393Syz155240 /* 21492393Syz155240 * i : the index of this packet (the icmp unreachable) 21502393Syz155240 * oi : the index of the original packet found in the 21512393Syz155240 * icmp header (i.e. the packet causing this icmp) 21522393Syz155240 * backward : original packet was backward compared to 21532393Syz155240 * the state 21542393Syz155240 */ 21552393Syz155240 backward = IP6_NEQ(&is->is_src, &src); 21562393Syz155240 fin->fin_rev = !backward; 21572393Syz155240 i = (!backward << 1) + fin->fin_out; 21582393Syz155240 oi = (backward << 1) + ofin.fin_out; 21592393Syz155240 21602393Syz155240 if (((is->is_pass & FR_NOICMPERR) != 0) || 21612393Syz155240 (is->is_icmppkts[i] > is->is_pkts[oi])) 21622393Syz155240 break; 21633448Sdh155122 ifs->ifs_ips_stats.iss_hits++; 21642393Syz155240 is->is_icmppkts[i]++; 21652393Syz155240 /* 21662393Syz155240 * we deliberately do not touch the timeouts 21672393Syz155240 * for the accompanying state table entry. 21682393Syz155240 * It remains to be seen if that is correct. XXX 21692393Syz155240 */ 21702393Syz155240 return is; 21712393Syz155240 } 21722393Syz155240 } 21733448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 21742393Syz155240 return NULL; 21752393Syz155240 } 21762393Syz155240 21772393Syz155240 21782393Syz155240 /* ------------------------------------------------------------------------ */ 21792393Syz155240 /* Function: fr_ipsmove */ 21802393Syz155240 /* Returns: Nil */ 21812393Syz155240 /* Parameters: is(I) - pointer to state table entry */ 21822393Syz155240 /* hv(I) - new hash value for state table entry */ 21832393Syz155240 /* Write Locks: ipf_state */ 21842393Syz155240 /* */ 21852393Syz155240 /* Move a state entry from one position in the hash table to another. */ 21862393Syz155240 /* ------------------------------------------------------------------------ */ 21873448Sdh155122 static void fr_ipsmove(is, hv, ifs) 21882393Syz155240 ipstate_t *is; 21892393Syz155240 u_int hv; 21903448Sdh155122 ipf_stack_t *ifs; 21912393Syz155240 { 21922393Syz155240 ipstate_t **isp; 21932393Syz155240 u_int hvm; 21942393Syz155240 21953448Sdh155122 ASSERT(rw_read_locked(&ifs->ifs_ipf_state.ipf_lk) == 0); 21962393Syz155240 21972393Syz155240 hvm = is->is_hv; 21982393Syz155240 /* 21992393Syz155240 * Remove the hash from the old location... 22002393Syz155240 */ 22012393Syz155240 isp = is->is_phnext; 22022393Syz155240 if (is->is_hnext) 22032393Syz155240 is->is_hnext->is_phnext = isp; 22042393Syz155240 *isp = is->is_hnext; 22053448Sdh155122 if (ifs->ifs_ips_table[hvm] == NULL) 22063448Sdh155122 ifs->ifs_ips_stats.iss_inuse--; 22073448Sdh155122 ifs->ifs_ips_stats.iss_bucketlen[hvm]--; 22082393Syz155240 22092393Syz155240 /* 22102393Syz155240 * ...and put the hash in the new one. 22112393Syz155240 */ 22123448Sdh155122 hvm = DOUBLE_HASH(hv, ifs); 22132393Syz155240 is->is_hv = hvm; 22143448Sdh155122 isp = &ifs->ifs_ips_table[hvm]; 22152393Syz155240 if (*isp) 22162393Syz155240 (*isp)->is_phnext = &is->is_hnext; 22172393Syz155240 else 22183448Sdh155122 ifs->ifs_ips_stats.iss_inuse++; 22193448Sdh155122 ifs->ifs_ips_stats.iss_bucketlen[hvm]++; 22202393Syz155240 is->is_phnext = isp; 22212393Syz155240 is->is_hnext = *isp; 22222393Syz155240 *isp = is; 22232393Syz155240 } 22242393Syz155240 22252393Syz155240 22262393Syz155240 /* ------------------------------------------------------------------------ */ 22272393Syz155240 /* Function: fr_stlookup */ 22282393Syz155240 /* Returns: ipstate_t* - NULL == no matching state found, */ 22292393Syz155240 /* else pointer to state information is returned */ 22302393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 22312393Syz155240 /* tcp(I) - pointer to TCP/UDP header. */ 22322393Syz155240 /* */ 22332393Syz155240 /* Search the state table for a matching entry to the packet described by */ 22342393Syz155240 /* the contents of *fin. */ 22352393Syz155240 /* */ 22362393Syz155240 /* If we return NULL then no lock on ipf_state is held. */ 22372393Syz155240 /* If we return non-null then a read-lock on ipf_state is held. */ 22382393Syz155240 /* ------------------------------------------------------------------------ */ 22392393Syz155240 ipstate_t *fr_stlookup(fin, tcp, ifqp) 22402393Syz155240 fr_info_t *fin; 22412393Syz155240 tcphdr_t *tcp; 22422393Syz155240 ipftq_t **ifqp; 22432393Syz155240 { 22442393Syz155240 u_int hv, hvm, pr, v, tryagain; 22452393Syz155240 ipstate_t *is, **isp; 22462393Syz155240 u_short dport, sport; 22472393Syz155240 i6addr_t src, dst; 22482393Syz155240 struct icmp *ic; 22492393Syz155240 ipftq_t *ifq; 22502393Syz155240 int oow; 22513448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 22522393Syz155240 22532393Syz155240 is = NULL; 22542393Syz155240 ifq = NULL; 22552393Syz155240 tcp = fin->fin_dp; 22562393Syz155240 ic = (struct icmp *)tcp; 22572393Syz155240 hv = (pr = fin->fin_fi.fi_p); 22582393Syz155240 src = fin->fin_fi.fi_src; 22592393Syz155240 dst = fin->fin_fi.fi_dst; 22602393Syz155240 hv += src.in4.s_addr; 22612393Syz155240 hv += dst.in4.s_addr; 22622393Syz155240 22632393Syz155240 v = fin->fin_fi.fi_v; 22642393Syz155240 #ifdef USE_INET6 22652393Syz155240 if (v == 6) { 22662393Syz155240 hv += fin->fin_fi.fi_src.i6[1]; 22672393Syz155240 hv += fin->fin_fi.fi_src.i6[2]; 22682393Syz155240 hv += fin->fin_fi.fi_src.i6[3]; 22692393Syz155240 22702393Syz155240 if ((fin->fin_p == IPPROTO_ICMPV6) && 22712393Syz155240 IN6_IS_ADDR_MULTICAST(&fin->fin_fi.fi_dst.in6)) { 22722393Syz155240 hv -= dst.in4.s_addr; 22732393Syz155240 } else { 22742393Syz155240 hv += fin->fin_fi.fi_dst.i6[1]; 22752393Syz155240 hv += fin->fin_fi.fi_dst.i6[2]; 22762393Syz155240 hv += fin->fin_fi.fi_dst.i6[3]; 22772393Syz155240 } 22782393Syz155240 } 22792393Syz155240 #endif 22802393Syz155240 22812393Syz155240 /* 22822393Syz155240 * Search the hash table for matching packet header info. 22832393Syz155240 */ 22842393Syz155240 switch (pr) 22852393Syz155240 { 22862393Syz155240 #ifdef USE_INET6 22872393Syz155240 case IPPROTO_ICMPV6 : 22882393Syz155240 tryagain = 0; 22892393Syz155240 if (v == 6) { 22902393Syz155240 if ((ic->icmp_type == ICMP6_ECHO_REQUEST) || 22912393Syz155240 (ic->icmp_type == ICMP6_ECHO_REPLY)) { 22922393Syz155240 hv += ic->icmp_id; 22932393Syz155240 } 22942393Syz155240 } 22953448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 22962393Syz155240 icmp6again: 22973448Sdh155122 hvm = DOUBLE_HASH(hv, ifs); 22983448Sdh155122 for (isp = &ifs->ifs_ips_table[hvm]; ((is = *isp) != NULL); ) { 22992393Syz155240 isp = &is->is_hnext; 23002393Syz155240 if ((is->is_p != pr) || (is->is_v != v)) 23012393Syz155240 continue; 23022393Syz155240 is = fr_matchsrcdst(fin, is, &src, &dst, NULL, FI_CMP); 23032393Syz155240 if (is != NULL && 23042393Syz155240 fr_matchicmpqueryreply(v, &is->is_icmp, 23052393Syz155240 ic, fin->fin_rev)) { 23062393Syz155240 if (fin->fin_rev) 23073448Sdh155122 ifq = &ifs->ifs_ips_icmpacktq; 23082393Syz155240 else 23093448Sdh155122 ifq = &ifs->ifs_ips_icmptq; 23102393Syz155240 break; 23112393Syz155240 } 23122393Syz155240 } 23132393Syz155240 23142393Syz155240 if (is != NULL) { 23152393Syz155240 if ((tryagain != 0) && !(is->is_flags & SI_W_DADDR)) { 23162393Syz155240 hv += fin->fin_fi.fi_src.i6[0]; 23172393Syz155240 hv += fin->fin_fi.fi_src.i6[1]; 23182393Syz155240 hv += fin->fin_fi.fi_src.i6[2]; 23192393Syz155240 hv += fin->fin_fi.fi_src.i6[3]; 23203448Sdh155122 fr_ipsmove(is, hv, ifs); 23213448Sdh155122 MUTEX_DOWNGRADE(&ifs->ifs_ipf_state); 23222393Syz155240 } 23232393Syz155240 break; 23242393Syz155240 } 23253448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 23262393Syz155240 23272393Syz155240 /* 23282393Syz155240 * No matching icmp state entry. Perhaps this is a 23292393Syz155240 * response to another state entry. 23302393Syz155240 * 23312393Syz155240 * XXX With some ICMP6 packets, the "other" address is already 23322393Syz155240 * in the packet, after the ICMP6 header, and this could be 23332393Syz155240 * used in place of the multicast address. However, taking 23342393Syz155240 * advantage of this requires some significant code changes 23352393Syz155240 * to handle the specific types where that is the case. 23362393Syz155240 */ 23373448Sdh155122 if ((ifs->ifs_ips_stats.iss_wild != 0) && (v == 6) && (tryagain == 0) && 23382393Syz155240 !IN6_IS_ADDR_MULTICAST(&fin->fin_fi.fi_src.in6)) { 23392393Syz155240 hv -= fin->fin_fi.fi_src.i6[0]; 23402393Syz155240 hv -= fin->fin_fi.fi_src.i6[1]; 23412393Syz155240 hv -= fin->fin_fi.fi_src.i6[2]; 23422393Syz155240 hv -= fin->fin_fi.fi_src.i6[3]; 23432393Syz155240 tryagain = 1; 23443448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 23452393Syz155240 goto icmp6again; 23462393Syz155240 } 23472393Syz155240 23482393Syz155240 is = fr_checkicmp6matchingstate(fin); 23492393Syz155240 if (is != NULL) 23502393Syz155240 return is; 23512393Syz155240 break; 23522393Syz155240 #endif 23532393Syz155240 23542393Syz155240 case IPPROTO_ICMP : 23552393Syz155240 if (v == 4) { 23562393Syz155240 hv += ic->icmp_id; 23572393Syz155240 } 23583448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 23593448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 23603448Sdh155122 for (isp = &ifs->ifs_ips_table[hv]; ((is = *isp) != NULL); ) { 23612393Syz155240 isp = &is->is_hnext; 23622393Syz155240 if ((is->is_p != pr) || (is->is_v != v)) 23632393Syz155240 continue; 23642393Syz155240 is = fr_matchsrcdst(fin, is, &src, &dst, NULL, FI_CMP); 23652393Syz155240 if (is != NULL && 23662393Syz155240 fr_matchicmpqueryreply(v, &is->is_icmp, 23672393Syz155240 ic, fin->fin_rev)) { 23682393Syz155240 if (fin->fin_rev) 23693448Sdh155122 ifq = &ifs->ifs_ips_icmpacktq; 23702393Syz155240 else 23713448Sdh155122 ifq = &ifs->ifs_ips_icmptq; 23722393Syz155240 break; 23732393Syz155240 } 23742393Syz155240 } 23752393Syz155240 if (is == NULL) { 23763448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 23772393Syz155240 } 23782393Syz155240 break; 23792393Syz155240 23802393Syz155240 case IPPROTO_TCP : 23812393Syz155240 case IPPROTO_UDP : 23822393Syz155240 ifqp = NULL; 23832393Syz155240 sport = htons(fin->fin_data[0]); 23842393Syz155240 hv += sport; 23852393Syz155240 dport = htons(fin->fin_data[1]); 23862393Syz155240 hv += dport; 23872393Syz155240 oow = 0; 23882393Syz155240 tryagain = 0; 23893448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 23902393Syz155240 retry_tcpudp: 23913448Sdh155122 hvm = DOUBLE_HASH(hv, ifs); 23923448Sdh155122 for (isp = &ifs->ifs_ips_table[hvm]; ((is = *isp) != NULL); ) { 23932393Syz155240 isp = &is->is_hnext; 23942393Syz155240 if ((is->is_p != pr) || (is->is_v != v)) 23952393Syz155240 continue; 23962393Syz155240 fin->fin_flx &= ~FI_OOW; 23972393Syz155240 is = fr_matchsrcdst(fin, is, &src, &dst, tcp, FI_CMP); 23982393Syz155240 if (is != NULL) { 23992393Syz155240 if (pr == IPPROTO_TCP) { 24002393Syz155240 if (!fr_tcpstate(fin, tcp, is)) { 24012393Syz155240 oow |= fin->fin_flx & FI_OOW; 24022393Syz155240 continue; 24032393Syz155240 } 24042393Syz155240 } 24052393Syz155240 break; 24062393Syz155240 } 24072393Syz155240 } 24082393Syz155240 if (is != NULL) { 24092393Syz155240 if (tryagain && 24102393Syz155240 !(is->is_flags & (SI_CLONE|SI_WILDP|SI_WILDA))) { 24112393Syz155240 hv += dport; 24122393Syz155240 hv += sport; 24133448Sdh155122 fr_ipsmove(is, hv, ifs); 24143448Sdh155122 MUTEX_DOWNGRADE(&ifs->ifs_ipf_state); 24152393Syz155240 } 24162393Syz155240 break; 24172393Syz155240 } 24183448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 24193448Sdh155122 24203448Sdh155122 if (!tryagain && ifs->ifs_ips_stats.iss_wild) { 24212393Syz155240 hv -= dport; 24222393Syz155240 hv -= sport; 24232393Syz155240 tryagain = 1; 24243448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 24252393Syz155240 goto retry_tcpudp; 24262393Syz155240 } 24272393Syz155240 fin->fin_flx |= oow; 24282393Syz155240 break; 24292393Syz155240 24302393Syz155240 #if 0 24312393Syz155240 case IPPROTO_GRE : 24322393Syz155240 gre = fin->fin_dp; 24332393Syz155240 if (GRE_REV(gre->gr_flags) == 1) { 24342393Syz155240 hv += gre->gr_call; 24352393Syz155240 } 24362393Syz155240 /* FALLTHROUGH */ 24372393Syz155240 #endif 24382393Syz155240 default : 24392393Syz155240 ifqp = NULL; 24403448Sdh155122 hvm = DOUBLE_HASH(hv, ifs); 24413448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 24423448Sdh155122 for (isp = &ifs->ifs_ips_table[hvm]; ((is = *isp) != NULL); ) { 24432393Syz155240 isp = &is->is_hnext; 24442393Syz155240 if ((is->is_p != pr) || (is->is_v != v)) 24452393Syz155240 continue; 24462393Syz155240 is = fr_matchsrcdst(fin, is, &src, &dst, NULL, FI_CMP); 24472393Syz155240 if (is != NULL) { 24483448Sdh155122 ifq = &ifs->ifs_ips_iptq; 24492393Syz155240 break; 24502393Syz155240 } 24512393Syz155240 } 24522393Syz155240 if (is == NULL) { 24533448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 24542393Syz155240 } 24552393Syz155240 break; 24562393Syz155240 } 24572393Syz155240 24582393Syz155240 if ((is != NULL) && ((is->is_sti.tqe_flags & TQE_RULEBASED) != 0) && 24592393Syz155240 (is->is_tqehead[fin->fin_rev] != NULL)) 24602393Syz155240 ifq = is->is_tqehead[fin->fin_rev]; 24612393Syz155240 if (ifq != NULL && ifqp != NULL) 24622393Syz155240 *ifqp = ifq; 24632393Syz155240 return is; 24642393Syz155240 } 24652393Syz155240 24662393Syz155240 24672393Syz155240 /* ------------------------------------------------------------------------ */ 24682393Syz155240 /* Function: fr_updatestate */ 24692393Syz155240 /* Returns: Nil */ 24702393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 24712393Syz155240 /* is(I) - pointer to state table entry */ 24722393Syz155240 /* Read Locks: ipf_state */ 24732393Syz155240 /* */ 24742393Syz155240 /* Updates packet and byte counters for a newly received packet. Seeds the */ 24752393Syz155240 /* fragment cache with a new entry as required. */ 24762393Syz155240 /* ------------------------------------------------------------------------ */ 24772393Syz155240 void fr_updatestate(fin, is, ifq) 24782393Syz155240 fr_info_t *fin; 24792393Syz155240 ipstate_t *is; 24802393Syz155240 ipftq_t *ifq; 24812393Syz155240 { 24822393Syz155240 ipftqent_t *tqe; 24832393Syz155240 int i, pass; 24843448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 24852393Syz155240 24862393Syz155240 i = (fin->fin_rev << 1) + fin->fin_out; 24872393Syz155240 24882393Syz155240 /* 24892393Syz155240 * For TCP packets, ifq == NULL. For all others, check if this new 24902393Syz155240 * queue is different to the last one it was on and move it if so. 24912393Syz155240 */ 24922393Syz155240 tqe = &is->is_sti; 24932393Syz155240 MUTEX_ENTER(&is->is_lock); 24942393Syz155240 if ((tqe->tqe_flags & TQE_RULEBASED) != 0) 24952393Syz155240 ifq = is->is_tqehead[fin->fin_rev]; 24962393Syz155240 24972393Syz155240 if (ifq != NULL) 24983448Sdh155122 fr_movequeue(tqe, tqe->tqe_ifq, ifq, ifs); 24992393Syz155240 25002393Syz155240 is->is_pkts[i]++; 25012393Syz155240 is->is_bytes[i] += fin->fin_plen; 25022393Syz155240 MUTEX_EXIT(&is->is_lock); 25032393Syz155240 25042393Syz155240 #ifdef IPFILTER_SYNC 25052393Syz155240 if (is->is_flags & IS_STATESYNC) 25062393Syz155240 ipfsync_update(SMC_STATE, fin, is->is_sync); 25072393Syz155240 #endif 25082393Syz155240 25093448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_hits); 25102393Syz155240 25112393Syz155240 fin->fin_fr = is->is_rule; 25122393Syz155240 25132393Syz155240 /* 25142393Syz155240 * If this packet is a fragment and the rule says to track fragments, 25152393Syz155240 * then create a new fragment cache entry. 25162393Syz155240 */ 25172393Syz155240 pass = is->is_pass; 25182393Syz155240 if ((fin->fin_flx & FI_FRAG) && FR_ISPASS(pass)) 25192393Syz155240 (void) fr_newfrag(fin, pass ^ FR_KEEPSTATE); 25202393Syz155240 } 25212393Syz155240 25222393Syz155240 25232393Syz155240 /* ------------------------------------------------------------------------ */ 25242393Syz155240 /* Function: fr_checkstate */ 25252393Syz155240 /* Returns: frentry_t* - NULL == search failed, */ 25262393Syz155240 /* else pointer to rule for matching state */ 25272393Syz155240 /* Parameters: ifp(I) - pointer to interface */ 25282393Syz155240 /* passp(I) - pointer to filtering result flags */ 25292393Syz155240 /* */ 25302393Syz155240 /* Check if a packet is associated with an entry in the state table. */ 25312393Syz155240 /* ------------------------------------------------------------------------ */ 25322393Syz155240 frentry_t *fr_checkstate(fin, passp) 25332393Syz155240 fr_info_t *fin; 25342393Syz155240 u_32_t *passp; 25352393Syz155240 { 25362393Syz155240 ipstate_t *is; 25372393Syz155240 frentry_t *fr; 25382393Syz155240 tcphdr_t *tcp; 25392393Syz155240 ipftq_t *ifq; 25402393Syz155240 u_int pass; 25413448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 25423448Sdh155122 25433448Sdh155122 if (ifs->ifs_fr_state_lock || (ifs->ifs_ips_list == NULL) || 25442393Syz155240 (fin->fin_flx & (FI_SHORT|FI_STATE|FI_FRAGBODY|FI_BAD))) 25452393Syz155240 return NULL; 25462393Syz155240 25472393Syz155240 is = NULL; 25482393Syz155240 if ((fin->fin_flx & FI_TCPUDP) || 25492393Syz155240 (fin->fin_fi.fi_p == IPPROTO_ICMP) 25502393Syz155240 #ifdef USE_INET6 25512393Syz155240 || (fin->fin_fi.fi_p == IPPROTO_ICMPV6) 25522393Syz155240 #endif 25532393Syz155240 ) 25542393Syz155240 tcp = fin->fin_dp; 25552393Syz155240 else 25562393Syz155240 tcp = NULL; 25572393Syz155240 25582393Syz155240 /* 25592393Syz155240 * Search the hash table for matching packet header info. 25602393Syz155240 */ 25612393Syz155240 ifq = NULL; 25622393Syz155240 is = fin->fin_state; 25632393Syz155240 if (is == NULL) 25642393Syz155240 is = fr_stlookup(fin, tcp, &ifq); 25652393Syz155240 switch (fin->fin_p) 25662393Syz155240 { 25672393Syz155240 #ifdef USE_INET6 25682393Syz155240 case IPPROTO_ICMPV6 : 25692393Syz155240 if (is != NULL) 25702393Syz155240 break; 25712393Syz155240 if (fin->fin_v == 6) { 25722393Syz155240 is = fr_checkicmp6matchingstate(fin); 25732393Syz155240 if (is != NULL) 25742393Syz155240 goto matched; 25752393Syz155240 } 25762393Syz155240 break; 25772393Syz155240 #endif 25782393Syz155240 case IPPROTO_ICMP : 25792393Syz155240 if (is != NULL) 25802393Syz155240 break; 25812393Syz155240 /* 25822393Syz155240 * No matching icmp state entry. Perhaps this is a 25832393Syz155240 * response to another state entry. 25842393Syz155240 */ 25852393Syz155240 is = fr_checkicmpmatchingstate(fin); 25862393Syz155240 if (is != NULL) 25872393Syz155240 goto matched; 25882393Syz155240 break; 25892393Syz155240 case IPPROTO_TCP : 25902393Syz155240 if (is == NULL) 25912393Syz155240 break; 25922393Syz155240 25932393Syz155240 if (is->is_pass & FR_NEWISN) { 25942393Syz155240 if (fin->fin_out == 0) 25952393Syz155240 fr_fixinisn(fin, is); 25962393Syz155240 else if (fin->fin_out == 1) 25972393Syz155240 fr_fixoutisn(fin, is); 25982393Syz155240 } 25992393Syz155240 break; 26002393Syz155240 default : 26012393Syz155240 if (fin->fin_rev) 26023448Sdh155122 ifq = &ifs->ifs_ips_udpacktq; 26032393Syz155240 else 26043448Sdh155122 ifq = &ifs->ifs_ips_udptq; 26052393Syz155240 break; 26062393Syz155240 } 26072393Syz155240 if (is == NULL) { 26083448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_miss); 26092393Syz155240 return NULL; 26102393Syz155240 } 26112393Syz155240 26122393Syz155240 matched: 26132393Syz155240 fr = is->is_rule; 26142393Syz155240 if (fr != NULL) { 26152393Syz155240 if ((fin->fin_out == 0) && (fr->fr_nattag.ipt_num[0] != 0)) { 26162393Syz155240 if (fin->fin_nattag == NULL) 26172393Syz155240 return NULL; 26182393Syz155240 if (fr_matchtag(&fr->fr_nattag, fin->fin_nattag) != 0) 26192393Syz155240 return NULL; 26202393Syz155240 } 26212393Syz155240 (void) strncpy(fin->fin_group, fr->fr_group, FR_GROUPLEN); 26222393Syz155240 fin->fin_icode = fr->fr_icode; 26232393Syz155240 } 26242393Syz155240 26252393Syz155240 fin->fin_rule = is->is_rulen; 26262393Syz155240 pass = is->is_pass; 26272393Syz155240 fr_updatestate(fin, is, ifq); 26282393Syz155240 if (fin->fin_out == 1) 26292393Syz155240 fin->fin_nat = is->is_nat[fin->fin_rev]; 26302393Syz155240 26312393Syz155240 fin->fin_state = is; 26323448Sdh155122 is->is_touched = ifs->ifs_fr_ticks; 26332393Syz155240 MUTEX_ENTER(&is->is_lock); 26342393Syz155240 is->is_ref++; 26352393Syz155240 MUTEX_EXIT(&is->is_lock); 26363448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 26372393Syz155240 fin->fin_flx |= FI_STATE; 26382393Syz155240 if ((pass & FR_LOGFIRST) != 0) 26392393Syz155240 pass &= ~(FR_LOGFIRST|FR_LOG); 26402393Syz155240 *passp = pass; 26412393Syz155240 return fr; 26422393Syz155240 } 26432393Syz155240 26442393Syz155240 26452393Syz155240 /* ------------------------------------------------------------------------ */ 26462393Syz155240 /* Function: fr_fixoutisn */ 26472393Syz155240 /* Returns: Nil */ 26482393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 26492393Syz155240 /* is(I) - pointer to master state structure */ 26502393Syz155240 /* */ 26512393Syz155240 /* Called only for outbound packets, adjusts the sequence number and the */ 26522393Syz155240 /* TCP checksum to match that change. */ 26532393Syz155240 /* ------------------------------------------------------------------------ */ 26542393Syz155240 static void fr_fixoutisn(fin, is) 26552393Syz155240 fr_info_t *fin; 26562393Syz155240 ipstate_t *is; 26572393Syz155240 { 26582393Syz155240 tcphdr_t *tcp; 26592393Syz155240 int rev; 26602393Syz155240 u_32_t seq; 26612393Syz155240 26622393Syz155240 tcp = fin->fin_dp; 26632393Syz155240 rev = fin->fin_rev; 26642393Syz155240 if ((is->is_flags & IS_ISNSYN) != 0) { 26652393Syz155240 if (rev == 0) { 26662393Syz155240 seq = ntohl(tcp->th_seq); 26672393Syz155240 seq += is->is_isninc[0]; 26682393Syz155240 tcp->th_seq = htonl(seq); 26692958Sdr146992 fix_outcksum(&tcp->th_sum, is->is_sumd[0]); 26702393Syz155240 } 26712393Syz155240 } 26722393Syz155240 if ((is->is_flags & IS_ISNACK) != 0) { 26732393Syz155240 if (rev == 1) { 26742393Syz155240 seq = ntohl(tcp->th_seq); 26752393Syz155240 seq += is->is_isninc[1]; 26762393Syz155240 tcp->th_seq = htonl(seq); 26772958Sdr146992 fix_outcksum(&tcp->th_sum, is->is_sumd[1]); 26782393Syz155240 } 26792393Syz155240 } 26802393Syz155240 } 26812393Syz155240 26822393Syz155240 26832393Syz155240 /* ------------------------------------------------------------------------ */ 26842393Syz155240 /* Function: fr_fixinisn */ 26852393Syz155240 /* Returns: Nil */ 26862393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 26872393Syz155240 /* is(I) - pointer to master state structure */ 26882393Syz155240 /* */ 26892393Syz155240 /* Called only for inbound packets, adjusts the acknowledge number and the */ 26902393Syz155240 /* TCP checksum to match that change. */ 26912393Syz155240 /* ------------------------------------------------------------------------ */ 26922393Syz155240 static void fr_fixinisn(fin, is) 26932393Syz155240 fr_info_t *fin; 26942393Syz155240 ipstate_t *is; 26952393Syz155240 { 26962393Syz155240 tcphdr_t *tcp; 26972393Syz155240 int rev; 26982393Syz155240 u_32_t ack; 26992393Syz155240 27002393Syz155240 tcp = fin->fin_dp; 27012393Syz155240 rev = fin->fin_rev; 27022393Syz155240 if ((is->is_flags & IS_ISNSYN) != 0) { 27032393Syz155240 if (rev == 1) { 27042393Syz155240 ack = ntohl(tcp->th_ack); 27052393Syz155240 ack -= is->is_isninc[0]; 27062393Syz155240 tcp->th_ack = htonl(ack); 27072958Sdr146992 fix_incksum(&tcp->th_sum, is->is_sumd[0]); 27082393Syz155240 } 27092393Syz155240 } 27102393Syz155240 if ((is->is_flags & IS_ISNACK) != 0) { 27112393Syz155240 if (rev == 0) { 27122393Syz155240 ack = ntohl(tcp->th_ack); 27132393Syz155240 ack -= is->is_isninc[1]; 27142393Syz155240 tcp->th_ack = htonl(ack); 27152958Sdr146992 fix_incksum(&tcp->th_sum, is->is_sumd[1]); 27162393Syz155240 } 27172393Syz155240 } 27182393Syz155240 } 27192393Syz155240 27202393Syz155240 27212393Syz155240 /* ------------------------------------------------------------------------ */ 27222393Syz155240 /* Function: fr_statesync */ 27232393Syz155240 /* Returns: Nil */ 27242958Sdr146992 /* Parameters: action(I) - type of synchronisation to do */ 27252958Sdr146992 /* v(I) - IP version being sync'd (v4 or v6) */ 27262958Sdr146992 /* ifp(I) - interface identifier associated with action */ 27272958Sdr146992 /* name(I) - name associated with ifp parameter */ 27282393Syz155240 /* */ 27292393Syz155240 /* Walk through all state entries and if an interface pointer match is */ 27302393Syz155240 /* found then look it up again, based on its name in case the pointer has */ 27312393Syz155240 /* changed since last time. */ 27322393Syz155240 /* */ 27332393Syz155240 /* If ifp is passed in as being non-null then we are only doing updates for */ 27342393Syz155240 /* existing, matching, uses of it. */ 27352393Syz155240 /* ------------------------------------------------------------------------ */ 27363448Sdh155122 void fr_statesync(action, v, ifp, name, ifs) 27372958Sdr146992 int action, v; 27382393Syz155240 void *ifp; 27392958Sdr146992 char *name; 27403448Sdh155122 ipf_stack_t *ifs; 27412393Syz155240 { 27422393Syz155240 ipstate_t *is; 27432393Syz155240 int i; 27442393Syz155240 27453448Sdh155122 if (ifs->ifs_fr_running <= 0) 27462393Syz155240 return; 27472393Syz155240 27483448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 27493448Sdh155122 27503448Sdh155122 if (ifs->ifs_fr_running <= 0) { 27513448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 27522393Syz155240 return; 27532393Syz155240 } 27542393Syz155240 27552958Sdr146992 switch (action) 27562958Sdr146992 { 27572958Sdr146992 case IPFSYNC_RESYNC : 27583448Sdh155122 for (is = ifs->ifs_ips_list; is; is = is->is_next) { 27592958Sdr146992 if (v != 0 && is->is_v != v) 27602958Sdr146992 continue; 27612958Sdr146992 /* 27622958Sdr146992 * Look up all the interface names in the state entry. 27632958Sdr146992 */ 27642958Sdr146992 for (i = 0; i < 4; i++) { 27652393Syz155240 is->is_ifp[i] = fr_resolvenic(is->is_ifname[i], 27663448Sdh155122 is->is_v, ifs); 27672958Sdr146992 } 27682393Syz155240 } 27692958Sdr146992 break; 27702958Sdr146992 case IPFSYNC_NEWIFP : 27713448Sdh155122 for (is = ifs->ifs_ips_list; is; is = is->is_next) { 27722958Sdr146992 if (v != 0 && is->is_v != v) 27732958Sdr146992 continue; 27742958Sdr146992 /* 27752958Sdr146992 * Look up all the interface names in the state entry. 27762958Sdr146992 */ 27772958Sdr146992 for (i = 0; i < 4; i++) { 27782958Sdr146992 if (!strncmp(is->is_ifname[i], name, 27792958Sdr146992 sizeof(is->is_ifname[i]))) 27802958Sdr146992 is->is_ifp[i] = ifp; 27812958Sdr146992 } 27822958Sdr146992 } 27832958Sdr146992 break; 27842958Sdr146992 case IPFSYNC_OLDIFP : 27853448Sdh155122 for (is = ifs->ifs_ips_list; is; is = is->is_next) { 27862958Sdr146992 if (v != 0 && is->is_v != v) 27872958Sdr146992 continue; 27882958Sdr146992 /* 27892958Sdr146992 * Look up all the interface names in the state entry. 27902958Sdr146992 */ 27912958Sdr146992 for (i = 0; i < 4; i++) { 27922958Sdr146992 if (is->is_ifp[i] == ifp) 27932958Sdr146992 is->is_ifp[i] = (void *)-1; 27942958Sdr146992 } 27952958Sdr146992 } 27962958Sdr146992 break; 27972393Syz155240 } 27983448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 27992393Syz155240 } 28002393Syz155240 28012393Syz155240 28022393Syz155240 /* ------------------------------------------------------------------------ */ 28032393Syz155240 /* Function: fr_delstate */ 28042393Syz155240 /* Returns: Nil */ 28052393Syz155240 /* Parameters: is(I) - pointer to state structure to delete */ 28062393Syz155240 /* why(I) - if not 0, log reason why it was deleted */ 28073187Sdr146992 /* Write Locks: ipf_state/ipf_global */ 28082393Syz155240 /* */ 28092393Syz155240 /* Deletes a state entry from the enumerated list as well as the hash table */ 28102393Syz155240 /* and timeout queue lists. Make adjustments to hash table statistics and */ 28112393Syz155240 /* global counters as required. */ 28122393Syz155240 /* ------------------------------------------------------------------------ */ 28133448Sdh155122 static void fr_delstate(is, why, ifs) 28142393Syz155240 ipstate_t *is; 28152393Syz155240 int why; 28163448Sdh155122 ipf_stack_t *ifs; 28172393Syz155240 { 28182393Syz155240 28193448Sdh155122 ASSERT(rw_write_held(&ifs->ifs_ipf_global.ipf_lk) == 0 || 28203448Sdh155122 rw_write_held(&ifs->ifs_ipf_state.ipf_lk) == 0); 28212393Syz155240 28222393Syz155240 /* 28232393Syz155240 * Since we want to delete this, remove it from the state table, 28242393Syz155240 * where it can be found & used, first. 28252393Syz155240 */ 28262393Syz155240 if (is->is_pnext != NULL) { 28272393Syz155240 *is->is_pnext = is->is_next; 28282393Syz155240 28292393Syz155240 if (is->is_next != NULL) 28302393Syz155240 is->is_next->is_pnext = is->is_pnext; 28312393Syz155240 28322393Syz155240 is->is_pnext = NULL; 28332393Syz155240 is->is_next = NULL; 28342393Syz155240 } 28352393Syz155240 28362393Syz155240 if (is->is_phnext != NULL) { 28372393Syz155240 *is->is_phnext = is->is_hnext; 28382393Syz155240 if (is->is_hnext != NULL) 28392393Syz155240 is->is_hnext->is_phnext = is->is_phnext; 28403448Sdh155122 if (ifs->ifs_ips_table[is->is_hv] == NULL) 28413448Sdh155122 ifs->ifs_ips_stats.iss_inuse--; 28423448Sdh155122 ifs->ifs_ips_stats.iss_bucketlen[is->is_hv]--; 28432393Syz155240 28442393Syz155240 is->is_phnext = NULL; 28452393Syz155240 is->is_hnext = NULL; 28462393Syz155240 } 28472393Syz155240 28482393Syz155240 /* 28493448Sdh155122 * Because ifs->ifs_ips_stats.iss_wild is a count of entries in the state 28502393Syz155240 * table that have wildcard flags set, only decerement it once 28512393Syz155240 * and do it here. 28522393Syz155240 */ 28532393Syz155240 if (is->is_flags & (SI_WILDP|SI_WILDA)) { 28542393Syz155240 if (!(is->is_flags & SI_CLONED)) { 28553448Sdh155122 ATOMIC_DECL(ifs->ifs_ips_stats.iss_wild); 28562393Syz155240 } 28572393Syz155240 is->is_flags &= ~(SI_WILDP|SI_WILDA); 28582393Syz155240 } 28592393Syz155240 28602393Syz155240 /* 28612393Syz155240 * Next, remove it from the timeout queue it is in. 28622393Syz155240 */ 28632393Syz155240 fr_deletequeueentry(&is->is_sti); 28642393Syz155240 28652393Syz155240 is->is_me = NULL; 28662393Syz155240 28672393Syz155240 /* 28682393Syz155240 * If it is still in use by something else, do not go any further, 28692393Syz155240 * but note that at this point it is now an orphan. 28702393Syz155240 */ 28712393Syz155240 is->is_ref--; 28722393Syz155240 if (is->is_ref > 0) 28732393Syz155240 return; 28742393Syz155240 28752393Syz155240 if (is->is_tqehead[0] != NULL) { 28762393Syz155240 if (fr_deletetimeoutqueue(is->is_tqehead[0]) == 0) 28773448Sdh155122 fr_freetimeoutqueue(is->is_tqehead[0], ifs); 28782393Syz155240 } 28792393Syz155240 if (is->is_tqehead[1] != NULL) { 28802393Syz155240 if (fr_deletetimeoutqueue(is->is_tqehead[1]) == 0) 28813448Sdh155122 fr_freetimeoutqueue(is->is_tqehead[1], ifs); 28822393Syz155240 } 28832393Syz155240 28842393Syz155240 #ifdef IPFILTER_SYNC 28852393Syz155240 if (is->is_sync) 28862393Syz155240 ipfsync_del(is->is_sync); 28872393Syz155240 #endif 28882393Syz155240 #ifdef IPFILTER_SCAN 28892393Syz155240 (void) ipsc_detachis(is); 28902393Syz155240 #endif 28912393Syz155240 28923448Sdh155122 if (ifs->ifs_ipstate_logging != 0 && why != 0) 28933448Sdh155122 ipstate_log(is, why, ifs); 28942393Syz155240 28952393Syz155240 if (is->is_rule != NULL) { 28962393Syz155240 is->is_rule->fr_statecnt--; 28973448Sdh155122 (void)fr_derefrule(&is->is_rule, ifs); 28982393Syz155240 } 28992393Syz155240 29002393Syz155240 MUTEX_DESTROY(&is->is_lock); 29012393Syz155240 KFREE(is); 29023448Sdh155122 ifs->ifs_ips_num--; 29032393Syz155240 } 29042393Syz155240 29052393Syz155240 29062393Syz155240 /* ------------------------------------------------------------------------ */ 29072393Syz155240 /* Function: fr_timeoutstate */ 29082393Syz155240 /* Returns: Nil */ 29092393Syz155240 /* Parameters: Nil */ 29102393Syz155240 /* */ 29112393Syz155240 /* Slowly expire held state for thingslike UDP and ICMP. The algorithm */ 29122393Syz155240 /* used here is to keep the queue sorted with the oldest things at the top */ 29132393Syz155240 /* and the youngest at the bottom. So if the top one doesn't need to be */ 29142393Syz155240 /* expired then neither will any under it. */ 29152393Syz155240 /* ------------------------------------------------------------------------ */ 29163448Sdh155122 void fr_timeoutstate(ifs) 29173448Sdh155122 ipf_stack_t *ifs; 29182393Syz155240 { 29192393Syz155240 ipftq_t *ifq, *ifqnext; 29202393Syz155240 ipftqent_t *tqe, *tqn; 29212393Syz155240 ipstate_t *is; 29222393Syz155240 SPL_INT(s); 29232393Syz155240 29242393Syz155240 SPL_NET(s); 29253448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 29263448Sdh155122 for (ifq = ifs->ifs_ips_tqtqb; ifq != NULL; ifq = ifq->ifq_next) 29272393Syz155240 for (tqn = ifq->ifq_head; ((tqe = tqn) != NULL); ) { 29283448Sdh155122 if (tqe->tqe_die > ifs->ifs_fr_ticks) 29292393Syz155240 break; 29302393Syz155240 tqn = tqe->tqe_next; 29312393Syz155240 is = tqe->tqe_parent; 29323448Sdh155122 fr_delstate(is, ISL_EXPIRE, ifs); 29332393Syz155240 } 29342393Syz155240 29353448Sdh155122 for (ifq = ifs->ifs_ips_utqe; ifq != NULL; ifq = ifqnext) { 29362393Syz155240 ifqnext = ifq->ifq_next; 29372393Syz155240 29382393Syz155240 for (tqn = ifq->ifq_head; ((tqe = tqn) != NULL); ) { 29393448Sdh155122 if (tqe->tqe_die > ifs->ifs_fr_ticks) 29402393Syz155240 break; 29412393Syz155240 tqn = tqe->tqe_next; 29422393Syz155240 is = tqe->tqe_parent; 29433448Sdh155122 fr_delstate(is, ISL_EXPIRE, ifs); 29442393Syz155240 } 29452393Syz155240 } 29462393Syz155240 29473448Sdh155122 for (ifq = ifs->ifs_ips_utqe; ifq != NULL; ifq = ifqnext) { 29482393Syz155240 ifqnext = ifq->ifq_next; 29492393Syz155240 29502393Syz155240 if (((ifq->ifq_flags & IFQF_DELETE) != 0) && 29512393Syz155240 (ifq->ifq_ref == 0)) { 29523448Sdh155122 fr_freetimeoutqueue(ifq, ifs); 29532393Syz155240 } 29542393Syz155240 } 29552393Syz155240 29563448Sdh155122 if (ifs->ifs_fr_state_doflush) { 29573448Sdh155122 (void) fr_state_flush(2, 0, ifs); 29583448Sdh155122 ifs->ifs_fr_state_doflush = 0; 29592393Syz155240 } 29603448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 29612393Syz155240 SPL_X(s); 29622393Syz155240 } 29632393Syz155240 29642393Syz155240 29652393Syz155240 /* ------------------------------------------------------------------------ */ 29662393Syz155240 /* Function: fr_state_flush */ 29672393Syz155240 /* Returns: int - 0 == success, -1 == failure */ 29682393Syz155240 /* Parameters: Nil */ 29692393Syz155240 /* Write Locks: ipf_state */ 29702393Syz155240 /* */ 29712393Syz155240 /* Flush state tables. Three actions currently defined: */ 29722393Syz155240 /* which == 0 : flush all state table entries */ 29732393Syz155240 /* which == 1 : flush TCP connections which have started to close but are */ 29742393Syz155240 /* stuck for some reason. */ 29752393Syz155240 /* which == 2 : flush TCP connections which have been idle for a long time, */ 29762393Syz155240 /* starting at > 4 days idle and working back in successive half-*/ 29772393Syz155240 /* days to at most 12 hours old. If this fails to free enough */ 29782393Syz155240 /* slots then work backwards in half hour slots to 30 minutes. */ 29792393Syz155240 /* If that too fails, then work backwards in 30 second intervals */ 29802393Syz155240 /* for the last 30 minutes to at worst 30 seconds idle. */ 29812393Syz155240 /* ------------------------------------------------------------------------ */ 29823448Sdh155122 static int fr_state_flush(which, proto, ifs) 29832393Syz155240 int which, proto; 29843448Sdh155122 ipf_stack_t *ifs; 29852393Syz155240 { 29862393Syz155240 ipftq_t *ifq, *ifqnext; 29872393Syz155240 ipftqent_t *tqe, *tqn; 29882393Syz155240 ipstate_t *is, **isp; 29892393Syz155240 int delete, removed; 29902393Syz155240 long try, maxtick; 29912393Syz155240 u_long interval; 29922393Syz155240 SPL_INT(s); 29932393Syz155240 29942393Syz155240 removed = 0; 29952393Syz155240 29962393Syz155240 SPL_NET(s); 29973448Sdh155122 for (isp = &ifs->ifs_ips_list; ((is = *isp) != NULL); ) { 29982393Syz155240 delete = 0; 29992393Syz155240 30002393Syz155240 if ((proto != 0) && (is->is_v != proto)) { 30012393Syz155240 isp = &is->is_next; 30022393Syz155240 continue; 30032393Syz155240 } 30042393Syz155240 30052393Syz155240 switch (which) 30062393Syz155240 { 30072393Syz155240 case 0 : 30082393Syz155240 delete = 1; 30092393Syz155240 break; 30102393Syz155240 case 1 : 30112393Syz155240 case 2 : 30122393Syz155240 if (is->is_p != IPPROTO_TCP) 30132393Syz155240 break; 30142393Syz155240 if ((is->is_state[0] != IPF_TCPS_ESTABLISHED) || 30152393Syz155240 (is->is_state[1] != IPF_TCPS_ESTABLISHED)) 30162393Syz155240 delete = 1; 30172393Syz155240 break; 30182393Syz155240 } 30192393Syz155240 30202393Syz155240 if (delete) { 30212393Syz155240 if (is->is_p == IPPROTO_TCP) 30223448Sdh155122 ifs->ifs_ips_stats.iss_fin++; 30232393Syz155240 else 30243448Sdh155122 ifs->ifs_ips_stats.iss_expire++; 30253448Sdh155122 fr_delstate(is, ISL_FLUSH, ifs); 30262393Syz155240 removed++; 30272393Syz155240 } else 30282393Syz155240 isp = &is->is_next; 30292393Syz155240 } 30302393Syz155240 30312393Syz155240 if (which != 2) { 30322393Syz155240 SPL_X(s); 30332393Syz155240 return removed; 30342393Syz155240 } 30352393Syz155240 30362393Syz155240 /* 30372393Syz155240 * Asked to remove inactive entries because the table is full, try 30382393Syz155240 * again, 3 times, if first attempt failed with a different criteria 30392393Syz155240 * each time. The order tried in must be in decreasing age. 30402393Syz155240 * Another alternative is to implement random drop and drop N entries 30412393Syz155240 * at random until N have been freed up. 30422393Syz155240 */ 30433448Sdh155122 if (ifs->ifs_fr_ticks - ifs->ifs_ips_last_force_flush < IPF_TTLVAL(5)) 30442393Syz155240 goto force_flush_skipped; 30453448Sdh155122 ifs->ifs_ips_last_force_flush = ifs->ifs_fr_ticks; 30463448Sdh155122 30473448Sdh155122 if (ifs->ifs_fr_ticks > IPF_TTLVAL(43200)) 30482393Syz155240 interval = IPF_TTLVAL(43200); 30493448Sdh155122 else if (ifs->ifs_fr_ticks > IPF_TTLVAL(1800)) 30502393Syz155240 interval = IPF_TTLVAL(1800); 30513448Sdh155122 else if (ifs->ifs_fr_ticks > IPF_TTLVAL(30)) 30522393Syz155240 interval = IPF_TTLVAL(30); 30532393Syz155240 else 30542393Syz155240 interval = IPF_TTLVAL(10); 30553448Sdh155122 try = ifs->ifs_fr_ticks - (ifs->ifs_fr_ticks - interval); 30562393Syz155240 if (try < 0) 30572393Syz155240 goto force_flush_skipped; 30582393Syz155240 30592393Syz155240 while (removed == 0) { 30603448Sdh155122 maxtick = ifs->ifs_fr_ticks - interval; 30612393Syz155240 if (maxtick < 0) 30622393Syz155240 break; 30632393Syz155240 30642393Syz155240 while (try < maxtick) { 30653448Sdh155122 for (ifq = ifs->ifs_ips_tqtqb; ifq != NULL; 30662393Syz155240 ifq = ifq->ifq_next) { 30672393Syz155240 for (tqn = ifq->ifq_head; 30682393Syz155240 ((tqe = tqn) != NULL); ) { 30692393Syz155240 if (tqe->tqe_die > try) 30702393Syz155240 break; 30712393Syz155240 tqn = tqe->tqe_next; 30722393Syz155240 is = tqe->tqe_parent; 30733448Sdh155122 fr_delstate(is, ISL_EXPIRE, ifs); 30742393Syz155240 removed++; 30752393Syz155240 } 30762393Syz155240 } 30772393Syz155240 30783448Sdh155122 for (ifq = ifs->ifs_ips_utqe; ifq != NULL; ifq = ifqnext) { 30792393Syz155240 ifqnext = ifq->ifq_next; 30802393Syz155240 30812393Syz155240 for (tqn = ifq->ifq_head; 30822393Syz155240 ((tqe = tqn) != NULL); ) { 30832393Syz155240 if (tqe->tqe_die > try) 30842393Syz155240 break; 30852393Syz155240 tqn = tqe->tqe_next; 30862393Syz155240 is = tqe->tqe_parent; 30873448Sdh155122 fr_delstate(is, ISL_EXPIRE, ifs); 30882393Syz155240 removed++; 30892393Syz155240 } 30902393Syz155240 } 30912393Syz155240 if (try + interval > maxtick) 30922393Syz155240 break; 30932393Syz155240 try += interval; 30942393Syz155240 } 30952393Syz155240 30962393Syz155240 if (removed == 0) { 30972393Syz155240 if (interval == IPF_TTLVAL(43200)) { 30982393Syz155240 interval = IPF_TTLVAL(1800); 30992393Syz155240 } else if (interval == IPF_TTLVAL(1800)) { 31002393Syz155240 interval = IPF_TTLVAL(30); 31012393Syz155240 } else if (interval == IPF_TTLVAL(30)) { 31022393Syz155240 interval = IPF_TTLVAL(10); 31032393Syz155240 } else { 31042393Syz155240 break; 31052393Syz155240 } 31062393Syz155240 } 31072393Syz155240 } 31082393Syz155240 force_flush_skipped: 31092393Syz155240 SPL_X(s); 31102393Syz155240 return removed; 31112393Syz155240 } 31122393Syz155240 31132393Syz155240 31142393Syz155240 31152393Syz155240 /* ------------------------------------------------------------------------ */ 31162393Syz155240 /* Function: fr_tcp_age */ 31172393Syz155240 /* Returns: int - 1 == state transition made, 0 == no change (rejected) */ 31182393Syz155240 /* Parameters: tq(I) - pointer to timeout queue information */ 31192393Syz155240 /* fin(I) - pointer to packet information */ 31202393Syz155240 /* tqtab(I) - TCP timeout queue table this is in */ 31212393Syz155240 /* flags(I) - flags from state/NAT entry */ 31222393Syz155240 /* */ 31232393Syz155240 /* Rewritten by Arjan de Vet <Arjan.deVet@adv.iae.nl>, 2000-07-29: */ 31242393Syz155240 /* */ 31252393Syz155240 /* - (try to) base state transitions on real evidence only, */ 31262393Syz155240 /* i.e. packets that are sent and have been received by ipfilter; */ 31272393Syz155240 /* diagram 18.12 of TCP/IP volume 1 by W. Richard Stevens was used. */ 31282393Syz155240 /* */ 31292393Syz155240 /* - deal with half-closed connections correctly; */ 31302393Syz155240 /* */ 31312393Syz155240 /* - store the state of the source in state[0] such that ipfstat */ 31322393Syz155240 /* displays the state as source/dest instead of dest/source; the calls */ 31332393Syz155240 /* to fr_tcp_age have been changed accordingly. */ 31342393Syz155240 /* */ 31352393Syz155240 /* Internal Parameters: */ 31362393Syz155240 /* */ 31372393Syz155240 /* state[0] = state of source (host that initiated connection) */ 31382393Syz155240 /* state[1] = state of dest (host that accepted the connection) */ 31392393Syz155240 /* */ 31402393Syz155240 /* dir == 0 : a packet from source to dest */ 31412393Syz155240 /* dir == 1 : a packet from dest to source */ 31422393Syz155240 /* */ 31432393Syz155240 /* Locking: it is assumed that the parent of the tqe structure is locked. */ 31442393Syz155240 /* ------------------------------------------------------------------------ */ 31452393Syz155240 int fr_tcp_age(tqe, fin, tqtab, flags) 31462393Syz155240 ipftqent_t *tqe; 31472393Syz155240 fr_info_t *fin; 31482393Syz155240 ipftq_t *tqtab; 31492393Syz155240 int flags; 31502393Syz155240 { 31512393Syz155240 int dlen, ostate, nstate, rval, dir; 31522393Syz155240 u_char tcpflags; 31532393Syz155240 tcphdr_t *tcp; 31543448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 31552393Syz155240 31562393Syz155240 tcp = fin->fin_dp; 31572393Syz155240 31582393Syz155240 rval = 0; 31592393Syz155240 dir = fin->fin_rev; 31602393Syz155240 tcpflags = tcp->th_flags; 31612393Syz155240 dlen = fin->fin_dlen - (TCP_OFF(tcp) << 2); 31622393Syz155240 31632393Syz155240 if (tcpflags & TH_RST) { 31642393Syz155240 if (!(tcpflags & TH_PUSH) && !dlen) 31652393Syz155240 nstate = IPF_TCPS_CLOSED; 31662393Syz155240 else 31672393Syz155240 nstate = IPF_TCPS_CLOSE_WAIT; 31682393Syz155240 rval = 1; 31692393Syz155240 } else { 31702393Syz155240 ostate = tqe->tqe_state[1 - dir]; 31712393Syz155240 nstate = tqe->tqe_state[dir]; 31722393Syz155240 31732393Syz155240 switch (nstate) 31742393Syz155240 { 31752393Syz155240 case IPF_TCPS_CLOSED: /* 0 */ 31762393Syz155240 if ((tcpflags & TH_OPENING) == TH_OPENING) { 31772393Syz155240 /* 31782393Syz155240 * 'dir' received an S and sends SA in 31792393Syz155240 * response, CLOSED -> SYN_RECEIVED 31802393Syz155240 */ 31812393Syz155240 nstate = IPF_TCPS_SYN_RECEIVED; 31822393Syz155240 rval = 1; 31832393Syz155240 } else if ((tcpflags & TH_OPENING) == TH_SYN) { 31842393Syz155240 /* 'dir' sent S, CLOSED -> SYN_SENT */ 31852393Syz155240 nstate = IPF_TCPS_SYN_SENT; 31862393Syz155240 rval = 1; 31872393Syz155240 } 31882393Syz155240 /* 31892393Syz155240 * the next piece of code makes it possible to get 31902393Syz155240 * already established connections into the state table 31912393Syz155240 * after a restart or reload of the filter rules; this 31922393Syz155240 * does not work when a strict 'flags S keep state' is 31932393Syz155240 * used for tcp connections of course 31942393Syz155240 */ 31952393Syz155240 if (((flags & IS_TCPFSM) == 0) && 31962393Syz155240 ((tcpflags & TH_ACKMASK) == TH_ACK)) { 31972393Syz155240 /* 31982393Syz155240 * we saw an A, guess 'dir' is in ESTABLISHED 31992393Syz155240 * mode 32002393Syz155240 */ 32012393Syz155240 switch (ostate) 32022393Syz155240 { 32032393Syz155240 case IPF_TCPS_CLOSED : 32042393Syz155240 case IPF_TCPS_SYN_RECEIVED : 32052393Syz155240 nstate = IPF_TCPS_HALF_ESTAB; 32062393Syz155240 rval = 1; 32072393Syz155240 break; 32082393Syz155240 case IPF_TCPS_HALF_ESTAB : 32092393Syz155240 case IPF_TCPS_ESTABLISHED : 32102393Syz155240 nstate = IPF_TCPS_ESTABLISHED; 32112393Syz155240 rval = 1; 32122393Syz155240 break; 32132393Syz155240 default : 32142393Syz155240 break; 32152393Syz155240 } 32162393Syz155240 } 32172393Syz155240 /* 32182393Syz155240 * TODO: besides regular ACK packets we can have other 32192393Syz155240 * packets as well; it is yet to be determined how we 32202393Syz155240 * should initialize the states in those cases 32212393Syz155240 */ 32222393Syz155240 break; 32232393Syz155240 32242393Syz155240 case IPF_TCPS_LISTEN: /* 1 */ 32252393Syz155240 /* NOT USED */ 32262393Syz155240 break; 32272393Syz155240 32282393Syz155240 case IPF_TCPS_SYN_SENT: /* 2 */ 32292393Syz155240 if ((tcpflags & ~(TH_ECN|TH_CWR)) == TH_SYN) { 32302393Syz155240 /* 32312393Syz155240 * A retransmitted SYN packet. We do not reset 32322393Syz155240 * the timeout here to fr_tcptimeout because a 32332393Syz155240 * connection connect timeout does not renew 32342393Syz155240 * after every packet that is sent. We need to 32352393Syz155240 * set rval so as to indicate the packet has 32362393Syz155240 * passed the check for its flags being valid 32372393Syz155240 * in the TCP FSM. Setting rval to 2 has the 32382393Syz155240 * result of not resetting the timeout. 32392393Syz155240 */ 32402393Syz155240 rval = 2; 32412393Syz155240 } else if ((tcpflags & (TH_SYN|TH_FIN|TH_ACK)) == 32422393Syz155240 TH_ACK) { 32432393Syz155240 /* 32442393Syz155240 * we see an A from 'dir' which is in SYN_SENT 32452393Syz155240 * state: 'dir' sent an A in response to an SA 32462393Syz155240 * which it received, SYN_SENT -> ESTABLISHED 32472393Syz155240 */ 32482393Syz155240 nstate = IPF_TCPS_ESTABLISHED; 32492393Syz155240 rval = 1; 32502393Syz155240 } else if (tcpflags & TH_FIN) { 32512393Syz155240 /* 32522393Syz155240 * we see an F from 'dir' which is in SYN_SENT 32532393Syz155240 * state and wants to close its side of the 32542393Syz155240 * connection; SYN_SENT -> FIN_WAIT_1 32552393Syz155240 */ 32562393Syz155240 nstate = IPF_TCPS_FIN_WAIT_1; 32572393Syz155240 rval = 1; 32582393Syz155240 } else if ((tcpflags & TH_OPENING) == TH_OPENING) { 32592393Syz155240 /* 32602393Syz155240 * we see an SA from 'dir' which is already in 32612393Syz155240 * SYN_SENT state, this means we have a 32622393Syz155240 * simultaneous open; SYN_SENT -> SYN_RECEIVED 32632393Syz155240 */ 32642393Syz155240 nstate = IPF_TCPS_SYN_RECEIVED; 32652393Syz155240 rval = 1; 32662393Syz155240 } 32672393Syz155240 break; 32682393Syz155240 32692393Syz155240 case IPF_TCPS_SYN_RECEIVED: /* 3 */ 32702393Syz155240 if ((tcpflags & (TH_SYN|TH_FIN|TH_ACK)) == TH_ACK) { 32712393Syz155240 /* 32722393Syz155240 * we see an A from 'dir' which was in 32732393Syz155240 * SYN_RECEIVED state so it must now be in 32742393Syz155240 * established state, SYN_RECEIVED -> 32752393Syz155240 * ESTABLISHED 32762393Syz155240 */ 32772393Syz155240 nstate = IPF_TCPS_ESTABLISHED; 32782393Syz155240 rval = 1; 32792393Syz155240 } else if ((tcpflags & ~(TH_ECN|TH_CWR)) == 32802393Syz155240 TH_OPENING) { 32812393Syz155240 /* 32822393Syz155240 * We see an SA from 'dir' which is already in 32832393Syz155240 * SYN_RECEIVED state. 32842393Syz155240 */ 32852393Syz155240 rval = 2; 32862393Syz155240 } else if (tcpflags & TH_FIN) { 32872393Syz155240 /* 32882393Syz155240 * we see an F from 'dir' which is in 32892393Syz155240 * SYN_RECEIVED state and wants to close its 32902393Syz155240 * side of the connection; SYN_RECEIVED -> 32912393Syz155240 * FIN_WAIT_1 32922393Syz155240 */ 32932393Syz155240 nstate = IPF_TCPS_FIN_WAIT_1; 32942393Syz155240 rval = 1; 32952393Syz155240 } 32962393Syz155240 break; 32972393Syz155240 32982393Syz155240 case IPF_TCPS_HALF_ESTAB: /* 4 */ 32992393Syz155240 if (ostate >= IPF_TCPS_HALF_ESTAB) { 33002393Syz155240 if ((tcpflags & TH_ACKMASK) == TH_ACK) { 33012393Syz155240 nstate = IPF_TCPS_ESTABLISHED; 33022393Syz155240 rval = 1; 33032393Syz155240 } 33042393Syz155240 } 33052393Syz155240 33062393Syz155240 break; 33072393Syz155240 33082393Syz155240 case IPF_TCPS_ESTABLISHED: /* 5 */ 33092393Syz155240 rval = 1; 33102393Syz155240 if (tcpflags & TH_FIN) { 33112393Syz155240 /* 33122393Syz155240 * 'dir' closed its side of the connection; 33132393Syz155240 * this gives us a half-closed connection; 33142393Syz155240 * ESTABLISHED -> FIN_WAIT_1 33152393Syz155240 */ 33162393Syz155240 nstate = IPF_TCPS_FIN_WAIT_1; 33172393Syz155240 } else if (tcpflags & TH_ACK) { 33182393Syz155240 /* 33192393Syz155240 * an ACK, should we exclude other flags here? 33202393Syz155240 */ 33212393Syz155240 if (ostate == IPF_TCPS_FIN_WAIT_1) { 33222393Syz155240 /* 33232393Syz155240 * We know the other side did an active 33242393Syz155240 * close, so we are ACKing the recvd 33252393Syz155240 * FIN packet (does the window matching 33262393Syz155240 * code guarantee this?) and go into 33272393Syz155240 * CLOSE_WAIT state; this gives us a 33282393Syz155240 * half-closed connection 33292393Syz155240 */ 33302393Syz155240 nstate = IPF_TCPS_CLOSE_WAIT; 33312393Syz155240 } else if (ostate < IPF_TCPS_CLOSE_WAIT) { 33322393Syz155240 /* 33332393Syz155240 * still a fully established 33342393Syz155240 * connection reset timeout 33352393Syz155240 */ 33362393Syz155240 nstate = IPF_TCPS_ESTABLISHED; 33372393Syz155240 } 33382393Syz155240 } 33392393Syz155240 break; 33402393Syz155240 33412393Syz155240 case IPF_TCPS_CLOSE_WAIT: /* 6 */ 33422393Syz155240 rval = 1; 33432393Syz155240 if (tcpflags & TH_FIN) { 33442393Syz155240 /* 33452393Syz155240 * application closed and 'dir' sent a FIN, 33462393Syz155240 * we're now going into LAST_ACK state 33472393Syz155240 */ 33482393Syz155240 nstate = IPF_TCPS_LAST_ACK; 33492393Syz155240 } else { 33502393Syz155240 /* 33512393Syz155240 * we remain in CLOSE_WAIT because the other 33522393Syz155240 * side has closed already and we did not 33532393Syz155240 * close our side yet; reset timeout 33542393Syz155240 */ 33552393Syz155240 nstate = IPF_TCPS_CLOSE_WAIT; 33562393Syz155240 } 33572393Syz155240 break; 33582393Syz155240 33592393Syz155240 case IPF_TCPS_FIN_WAIT_1: /* 7 */ 33602393Syz155240 rval = 1; 33612393Syz155240 if ((tcpflags & TH_ACK) && 33622393Syz155240 ostate > IPF_TCPS_CLOSE_WAIT) { 33632393Syz155240 /* 33642393Syz155240 * if the other side is not active anymore 33652393Syz155240 * it has sent us a FIN packet that we are 33662393Syz155240 * ack'ing now with an ACK; this means both 33672393Syz155240 * sides have now closed the connection and 33682393Syz155240 * we go into TIME_WAIT 33692393Syz155240 */ 33702393Syz155240 /* 33712393Syz155240 * XXX: how do we know we really are ACKing 33722393Syz155240 * the FIN packet here? does the window code 33732393Syz155240 * guarantee that? 33742393Syz155240 */ 33752393Syz155240 nstate = IPF_TCPS_TIME_WAIT; 33762393Syz155240 } else { 33772393Syz155240 /* 33782393Syz155240 * we closed our side of the connection 33792393Syz155240 * already but the other side is still active 33802393Syz155240 * (ESTABLISHED/CLOSE_WAIT); continue with 33812393Syz155240 * this half-closed connection 33822393Syz155240 */ 33832393Syz155240 nstate = IPF_TCPS_FIN_WAIT_1; 33842393Syz155240 } 33852393Syz155240 break; 33862393Syz155240 33872393Syz155240 case IPF_TCPS_CLOSING: /* 8 */ 33882393Syz155240 /* NOT USED */ 33892393Syz155240 break; 33902393Syz155240 33912393Syz155240 case IPF_TCPS_LAST_ACK: /* 9 */ 33922393Syz155240 if (tcpflags & TH_ACK) { 33932393Syz155240 if ((tcpflags & TH_PUSH) || dlen) 33942393Syz155240 /* 33952393Syz155240 * there is still data to be delivered, 33962393Syz155240 * reset timeout 33972393Syz155240 */ 33982393Syz155240 rval = 1; 33992393Syz155240 else 34002393Syz155240 rval = 2; 34012393Syz155240 } 34022393Syz155240 /* 34032393Syz155240 * we cannot detect when we go out of LAST_ACK state to 34042393Syz155240 * CLOSED because that is based on the reception of ACK 34052393Syz155240 * packets; ipfilter can only detect that a packet 34062393Syz155240 * has been sent by a host 34072393Syz155240 */ 34082393Syz155240 break; 34092393Syz155240 34102393Syz155240 case IPF_TCPS_FIN_WAIT_2: /* 10 */ 34112393Syz155240 rval = 1; 34122393Syz155240 if ((tcpflags & TH_OPENING) == TH_OPENING) 34132393Syz155240 nstate = IPF_TCPS_SYN_RECEIVED; 34142393Syz155240 else if (tcpflags & TH_SYN) 34152393Syz155240 nstate = IPF_TCPS_SYN_SENT; 34162393Syz155240 break; 34172393Syz155240 34182393Syz155240 case IPF_TCPS_TIME_WAIT: /* 11 */ 34192393Syz155240 /* we're in 2MSL timeout now */ 34202393Syz155240 rval = 1; 34212393Syz155240 break; 34222393Syz155240 34232393Syz155240 default : 34242393Syz155240 #if defined(_KERNEL) 34252393Syz155240 # if SOLARIS 34262393Syz155240 cmn_err(CE_NOTE, 34272393Syz155240 "tcp %lx flags %x si %lx nstate %d ostate %d\n", 34282393Syz155240 (u_long)tcp, tcpflags, (u_long)tqe, 34292393Syz155240 nstate, ostate); 34302393Syz155240 # else 34312393Syz155240 printf("tcp %lx flags %x si %lx nstate %d ostate %d\n", 34322393Syz155240 (u_long)tcp, tcpflags, (u_long)tqe, 34332393Syz155240 nstate, ostate); 34342393Syz155240 # endif 34352393Syz155240 #else 34362393Syz155240 abort(); 34372393Syz155240 #endif 34382393Syz155240 break; 34392393Syz155240 } 34402393Syz155240 } 34412393Syz155240 34422393Syz155240 /* 34432393Syz155240 * If rval == 2 then do not update the queue position, but treat the 34442393Syz155240 * packet as being ok. 34452393Syz155240 */ 34462393Syz155240 if (rval == 2) 34472393Syz155240 rval = 1; 34482393Syz155240 else if (rval == 1) { 34492393Syz155240 tqe->tqe_state[dir] = nstate; 34502393Syz155240 if ((tqe->tqe_flags & TQE_RULEBASED) == 0) 34513448Sdh155122 fr_movequeue(tqe, tqe->tqe_ifq, tqtab + nstate, ifs); 34522393Syz155240 } 34532393Syz155240 34542393Syz155240 return rval; 34552393Syz155240 } 34562393Syz155240 34572393Syz155240 34582393Syz155240 /* ------------------------------------------------------------------------ */ 34592393Syz155240 /* Function: ipstate_log */ 34602393Syz155240 /* Returns: Nil */ 34612393Syz155240 /* Parameters: is(I) - pointer to state structure */ 34622393Syz155240 /* type(I) - type of log entry to create */ 34632393Syz155240 /* */ 34642393Syz155240 /* Creates a state table log entry using the state structure and type info. */ 34652393Syz155240 /* passed in. Log packet/byte counts, source/destination address and other */ 34662393Syz155240 /* protocol specific information. */ 34672393Syz155240 /* ------------------------------------------------------------------------ */ 34683448Sdh155122 void ipstate_log(is, type, ifs) 34692393Syz155240 struct ipstate *is; 34702393Syz155240 u_int type; 34713448Sdh155122 ipf_stack_t *ifs; 34722393Syz155240 { 34732393Syz155240 #ifdef IPFILTER_LOG 34742393Syz155240 struct ipslog ipsl; 34752393Syz155240 size_t sizes[1]; 34762393Syz155240 void *items[1]; 34772393Syz155240 int types[1]; 34782393Syz155240 34792393Syz155240 /* 34802393Syz155240 * Copy information out of the ipstate_t structure and into the 34812393Syz155240 * structure used for logging. 34822393Syz155240 */ 34832393Syz155240 ipsl.isl_type = type; 34842393Syz155240 ipsl.isl_pkts[0] = is->is_pkts[0] + is->is_icmppkts[0]; 34852393Syz155240 ipsl.isl_bytes[0] = is->is_bytes[0]; 34862393Syz155240 ipsl.isl_pkts[1] = is->is_pkts[1] + is->is_icmppkts[1]; 34872393Syz155240 ipsl.isl_bytes[1] = is->is_bytes[1]; 34882393Syz155240 ipsl.isl_pkts[2] = is->is_pkts[2] + is->is_icmppkts[2]; 34892393Syz155240 ipsl.isl_bytes[2] = is->is_bytes[2]; 34902393Syz155240 ipsl.isl_pkts[3] = is->is_pkts[3] + is->is_icmppkts[3]; 34912393Syz155240 ipsl.isl_bytes[3] = is->is_bytes[3]; 34922393Syz155240 ipsl.isl_src = is->is_src; 34932393Syz155240 ipsl.isl_dst = is->is_dst; 34942393Syz155240 ipsl.isl_p = is->is_p; 34952393Syz155240 ipsl.isl_v = is->is_v; 34962393Syz155240 ipsl.isl_flags = is->is_flags; 34972393Syz155240 ipsl.isl_tag = is->is_tag; 34982393Syz155240 ipsl.isl_rulen = is->is_rulen; 34992393Syz155240 (void) strncpy(ipsl.isl_group, is->is_group, FR_GROUPLEN); 35002393Syz155240 35012393Syz155240 if (ipsl.isl_p == IPPROTO_TCP || ipsl.isl_p == IPPROTO_UDP) { 35022393Syz155240 ipsl.isl_sport = is->is_sport; 35032393Syz155240 ipsl.isl_dport = is->is_dport; 35042393Syz155240 if (ipsl.isl_p == IPPROTO_TCP) { 35052393Syz155240 ipsl.isl_state[0] = is->is_state[0]; 35062393Syz155240 ipsl.isl_state[1] = is->is_state[1]; 35072393Syz155240 } 35082393Syz155240 } else if (ipsl.isl_p == IPPROTO_ICMP) { 35092393Syz155240 ipsl.isl_itype = is->is_icmp.ici_type; 35102393Syz155240 } else if (ipsl.isl_p == IPPROTO_ICMPV6) { 35112393Syz155240 ipsl.isl_itype = is->is_icmp.ici_type; 35122393Syz155240 } else { 35132393Syz155240 ipsl.isl_ps.isl_filler[0] = 0; 35142393Syz155240 ipsl.isl_ps.isl_filler[1] = 0; 35152393Syz155240 } 35162393Syz155240 35172393Syz155240 items[0] = &ipsl; 35182393Syz155240 sizes[0] = sizeof(ipsl); 35192393Syz155240 types[0] = 0; 35202393Syz155240 35213448Sdh155122 if (ipllog(IPL_LOGSTATE, NULL, items, sizes, types, 1, ifs)) { 35223448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_logged); 35232393Syz155240 } else { 35243448Sdh155122 ATOMIC_INCL(ifs->ifs_ips_stats.iss_logfail); 35252393Syz155240 } 35262393Syz155240 #endif 35272393Syz155240 } 35282393Syz155240 35292393Syz155240 35302393Syz155240 #ifdef USE_INET6 35312393Syz155240 /* ------------------------------------------------------------------------ */ 35322393Syz155240 /* Function: fr_checkicmp6matchingstate */ 35332393Syz155240 /* Returns: ipstate_t* - NULL == no match found, */ 35342393Syz155240 /* else pointer to matching state entry */ 35352393Syz155240 /* Parameters: fin(I) - pointer to packet information */ 35362393Syz155240 /* Locks: NULL == no locks, else Read Lock on ipf_state */ 35372393Syz155240 /* */ 35382393Syz155240 /* If we've got an ICMPv6 error message, using the information stored in */ 35392393Syz155240 /* the ICMPv6 packet, look for a matching state table entry. */ 35402393Syz155240 /* ------------------------------------------------------------------------ */ 35412393Syz155240 static ipstate_t *fr_checkicmp6matchingstate(fin) 35422393Syz155240 fr_info_t *fin; 35432393Syz155240 { 35442393Syz155240 struct icmp6_hdr *ic6, *oic; 35452393Syz155240 int backward, i; 35462393Syz155240 ipstate_t *is, **isp; 35472393Syz155240 u_short sport, dport; 35482393Syz155240 i6addr_t dst, src; 35492393Syz155240 u_short savelen; 35502393Syz155240 icmpinfo_t *ic; 35512393Syz155240 fr_info_t ofin; 35522393Syz155240 tcphdr_t *tcp; 35532393Syz155240 ip6_t *oip6; 35542393Syz155240 u_char pr; 35552393Syz155240 u_int hv; 35563448Sdh155122 ipf_stack_t *ifs = fin->fin_ifs; 35572393Syz155240 35582393Syz155240 /* 35592393Syz155240 * Does it at least have the return (basic) IP header ? 35602393Syz155240 * Is it an actual recognised ICMP error type? 35612393Syz155240 * Only a basic IP header (no options) should be with 35622393Syz155240 * an ICMP error header. 35632393Syz155240 */ 35642393Syz155240 if ((fin->fin_v != 6) || (fin->fin_plen < ICMP6ERR_MINPKTLEN) || 35652393Syz155240 !(fin->fin_flx & FI_ICMPERR)) 35662393Syz155240 return NULL; 35672393Syz155240 35682393Syz155240 ic6 = fin->fin_dp; 35692393Syz155240 35702393Syz155240 oip6 = (ip6_t *)((char *)ic6 + ICMPERR_ICMPHLEN); 35712393Syz155240 if (fin->fin_plen < sizeof(*oip6)) 35722393Syz155240 return NULL; 35732393Syz155240 35743607Szf203873 bcopy((char *)fin, (char *)&ofin, sizeof(*fin)); 35752393Syz155240 ofin.fin_v = 6; 35762393Syz155240 ofin.fin_ifp = fin->fin_ifp; 35772393Syz155240 ofin.fin_out = !fin->fin_out; 35782393Syz155240 ofin.fin_m = NULL; /* if dereferenced, panic XXX */ 35792393Syz155240 ofin.fin_mp = NULL; /* if dereferenced, panic XXX */ 35802393Syz155240 35812393Syz155240 /* 35822393Syz155240 * We make a fin entry to be able to feed it to 35832393Syz155240 * matchsrcdst. Note that not all fields are necessary 35842393Syz155240 * but this is the cleanest way. Note further we fill 35852393Syz155240 * in fin_mp such that if someone uses it we'll get 35862393Syz155240 * a kernel panic. fr_matchsrcdst does not use this. 35872393Syz155240 * 35882393Syz155240 * watch out here, as ip is in host order and oip6 in network 35892393Syz155240 * order. Any change we make must be undone afterwards. 35902393Syz155240 */ 35912393Syz155240 savelen = oip6->ip6_plen; 35922393Syz155240 oip6->ip6_plen = fin->fin_dlen - ICMPERR_ICMPHLEN; 35932393Syz155240 ofin.fin_flx = FI_NOCKSUM; 35942393Syz155240 ofin.fin_ip = (ip_t *)oip6; 35952393Syz155240 ofin.fin_plen = oip6->ip6_plen; 35962393Syz155240 (void) fr_makefrip(sizeof(*oip6), (ip_t *)oip6, &ofin); 35972393Syz155240 ofin.fin_flx &= ~(FI_BAD|FI_SHORT); 35982393Syz155240 oip6->ip6_plen = savelen; 35992393Syz155240 36002393Syz155240 if (oip6->ip6_nxt == IPPROTO_ICMPV6) { 36012393Syz155240 oic = (struct icmp6_hdr *)(oip6 + 1); 36022393Syz155240 /* 36032393Syz155240 * an ICMP error can only be generated as a result of an 36042393Syz155240 * ICMP query, not as the response on an ICMP error 36052393Syz155240 * 36062393Syz155240 * XXX theoretically ICMP_ECHOREP and the other reply's are 36072393Syz155240 * ICMP query's as well, but adding them here seems strange XXX 36082393Syz155240 */ 36092393Syz155240 if (!(oic->icmp6_type & ICMP6_INFOMSG_MASK)) 36102393Syz155240 return NULL; 36112393Syz155240 36122393Syz155240 /* 36132393Syz155240 * perform a lookup of the ICMP packet in the state table 36142393Syz155240 */ 36152393Syz155240 hv = (pr = oip6->ip6_nxt); 36162393Syz155240 src.in6 = oip6->ip6_src; 36172393Syz155240 hv += src.in4.s_addr; 36182393Syz155240 dst.in6 = oip6->ip6_dst; 36192393Syz155240 hv += dst.in4.s_addr; 36202393Syz155240 hv += oic->icmp6_id; 36212393Syz155240 hv += oic->icmp6_seq; 36223448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 36233448Sdh155122 36243448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 36253448Sdh155122 for (isp = &ifs->ifs_ips_table[hv]; ((is = *isp) != NULL); ) { 36262393Syz155240 ic = &is->is_icmp; 36272393Syz155240 isp = &is->is_hnext; 36282393Syz155240 if ((is->is_p == pr) && 36292393Syz155240 !(is->is_pass & FR_NOICMPERR) && 36302393Syz155240 (oic->icmp6_id == ic->ici_id) && 36312393Syz155240 (oic->icmp6_seq == ic->ici_seq) && 36322393Syz155240 (is = fr_matchsrcdst(&ofin, is, &src, 36332393Syz155240 &dst, NULL, FI_ICMPCMP))) { 36342393Syz155240 /* 36352393Syz155240 * in the state table ICMP query's are stored 36362393Syz155240 * with the type of the corresponding ICMP 36372393Syz155240 * response. Correct here 36382393Syz155240 */ 36392393Syz155240 if (((ic->ici_type == ICMP6_ECHO_REPLY) && 36402393Syz155240 (oic->icmp6_type == ICMP6_ECHO_REQUEST)) || 36412393Syz155240 (ic->ici_type - 1 == oic->icmp6_type )) { 36423448Sdh155122 ifs->ifs_ips_stats.iss_hits++; 36432393Syz155240 backward = IP6_NEQ(&is->is_dst, &src); 36442393Syz155240 fin->fin_rev = !backward; 36452393Syz155240 i = (backward << 1) + fin->fin_out; 36462393Syz155240 is->is_icmppkts[i]++; 36472393Syz155240 return is; 36482393Syz155240 } 36492393Syz155240 } 36502393Syz155240 } 36513448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 36522393Syz155240 return NULL; 36532393Syz155240 } 36542393Syz155240 36552393Syz155240 hv = (pr = oip6->ip6_nxt); 36562393Syz155240 src.in6 = oip6->ip6_src; 36572393Syz155240 hv += src.i6[0]; 36582393Syz155240 hv += src.i6[1]; 36592393Syz155240 hv += src.i6[2]; 36602393Syz155240 hv += src.i6[3]; 36612393Syz155240 dst.in6 = oip6->ip6_dst; 36622393Syz155240 hv += dst.i6[0]; 36632393Syz155240 hv += dst.i6[1]; 36642393Syz155240 hv += dst.i6[2]; 36652393Syz155240 hv += dst.i6[3]; 36662393Syz155240 36672393Syz155240 if ((oip6->ip6_nxt == IPPROTO_TCP) || (oip6->ip6_nxt == IPPROTO_UDP)) { 36682393Syz155240 tcp = (tcphdr_t *)(oip6 + 1); 36692393Syz155240 dport = tcp->th_dport; 36702393Syz155240 sport = tcp->th_sport; 36712393Syz155240 hv += dport; 36722393Syz155240 hv += sport; 36732393Syz155240 } else 36742393Syz155240 tcp = NULL; 36753448Sdh155122 hv = DOUBLE_HASH(hv, ifs); 36763448Sdh155122 36773448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 36783448Sdh155122 for (isp = &ifs->ifs_ips_table[hv]; ((is = *isp) != NULL); ) { 36792393Syz155240 isp = &is->is_hnext; 36802393Syz155240 /* 36812393Syz155240 * Only allow this icmp though if the 36822393Syz155240 * encapsulated packet was allowed through the 36832393Syz155240 * other way around. Note that the minimal amount 36842393Syz155240 * of info present does not allow for checking against 36852393Syz155240 * tcp internals such as seq and ack numbers. 36862393Syz155240 */ 36872393Syz155240 if ((is->is_p != pr) || (is->is_v != 6) || 36882393Syz155240 (is->is_pass & FR_NOICMPERR)) 36892393Syz155240 continue; 36902393Syz155240 is = fr_matchsrcdst(&ofin, is, &src, &dst, tcp, FI_ICMPCMP); 36912393Syz155240 if (is != NULL) { 36923448Sdh155122 ifs->ifs_ips_stats.iss_hits++; 36932393Syz155240 backward = IP6_NEQ(&is->is_dst, &src); 36942393Syz155240 fin->fin_rev = !backward; 36952393Syz155240 i = (backward << 1) + fin->fin_out; 36962393Syz155240 is->is_icmppkts[i]++; 36972393Syz155240 /* 36982393Syz155240 * we deliberately do not touch the timeouts 36992393Syz155240 * for the accompanying state table entry. 37002393Syz155240 * It remains to be seen if that is correct. XXX 37012393Syz155240 */ 37022393Syz155240 return is; 37032393Syz155240 } 37042393Syz155240 } 37053448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 37062393Syz155240 return NULL; 37072393Syz155240 } 37082393Syz155240 #endif 37092393Syz155240 37102393Syz155240 37112393Syz155240 /* ------------------------------------------------------------------------ */ 37122393Syz155240 /* Function: fr_sttab_init */ 37132393Syz155240 /* Returns: Nil */ 37142393Syz155240 /* Parameters: tqp(I) - pointer to an array of timeout queues for TCP */ 37152393Syz155240 /* */ 37162393Syz155240 /* Initialise the array of timeout queues for TCP. */ 37172393Syz155240 /* ------------------------------------------------------------------------ */ 37183448Sdh155122 void fr_sttab_init(tqp, ifs) 37192393Syz155240 ipftq_t *tqp; 37203448Sdh155122 ipf_stack_t *ifs; 37212393Syz155240 { 37222393Syz155240 int i; 37232393Syz155240 37242393Syz155240 for (i = IPF_TCP_NSTATES - 1; i >= 0; i--) { 37252393Syz155240 tqp[i].ifq_ttl = 0; 37262393Syz155240 tqp[i].ifq_ref = 1; 37272393Syz155240 tqp[i].ifq_head = NULL; 37282393Syz155240 tqp[i].ifq_tail = &tqp[i].ifq_head; 37292393Syz155240 tqp[i].ifq_next = tqp + i + 1; 37302393Syz155240 MUTEX_INIT(&tqp[i].ifq_lock, "ipftq tcp tab"); 37312393Syz155240 } 37322393Syz155240 tqp[IPF_TCP_NSTATES - 1].ifq_next = NULL; 37333448Sdh155122 tqp[IPF_TCPS_CLOSED].ifq_ttl = ifs->ifs_fr_tcpclosed; 37343448Sdh155122 tqp[IPF_TCPS_LISTEN].ifq_ttl = ifs->ifs_fr_tcptimeout; 37353448Sdh155122 tqp[IPF_TCPS_SYN_SENT].ifq_ttl = ifs->ifs_fr_tcptimeout; 37363448Sdh155122 tqp[IPF_TCPS_SYN_RECEIVED].ifq_ttl = ifs->ifs_fr_tcptimeout; 37373448Sdh155122 tqp[IPF_TCPS_ESTABLISHED].ifq_ttl = ifs->ifs_fr_tcpidletimeout; 37383448Sdh155122 tqp[IPF_TCPS_CLOSE_WAIT].ifq_ttl = ifs->ifs_fr_tcphalfclosed; 37393448Sdh155122 tqp[IPF_TCPS_FIN_WAIT_1].ifq_ttl = ifs->ifs_fr_tcphalfclosed; 37403448Sdh155122 tqp[IPF_TCPS_CLOSING].ifq_ttl = ifs->ifs_fr_tcptimeout; 37413448Sdh155122 tqp[IPF_TCPS_LAST_ACK].ifq_ttl = ifs->ifs_fr_tcplastack; 37423448Sdh155122 tqp[IPF_TCPS_FIN_WAIT_2].ifq_ttl = ifs->ifs_fr_tcpclosewait; 37433448Sdh155122 tqp[IPF_TCPS_TIME_WAIT].ifq_ttl = ifs->ifs_fr_tcptimeout; 37443448Sdh155122 tqp[IPF_TCPS_HALF_ESTAB].ifq_ttl = ifs->ifs_fr_tcptimeout; 37452393Syz155240 } 37462393Syz155240 37472393Syz155240 37482393Syz155240 /* ------------------------------------------------------------------------ */ 37492393Syz155240 /* Function: fr_sttab_destroy */ 37502393Syz155240 /* Returns: Nil */ 37512393Syz155240 /* Parameters: tqp(I) - pointer to an array of timeout queues for TCP */ 37522393Syz155240 /* */ 37532393Syz155240 /* Do whatever is necessary to "destroy" each of the entries in the array */ 37542393Syz155240 /* of timeout queues for TCP. */ 37552393Syz155240 /* ------------------------------------------------------------------------ */ 37562393Syz155240 void fr_sttab_destroy(tqp) 37572393Syz155240 ipftq_t *tqp; 37582393Syz155240 { 37592393Syz155240 int i; 37602393Syz155240 37612393Syz155240 for (i = IPF_TCP_NSTATES - 1; i >= 0; i--) 37622393Syz155240 MUTEX_DESTROY(&tqp[i].ifq_lock); 37632393Syz155240 } 37642393Syz155240 37652393Syz155240 37662393Syz155240 /* ------------------------------------------------------------------------ */ 37672393Syz155240 /* Function: fr_statederef */ 37682393Syz155240 /* Returns: Nil */ 37692393Syz155240 /* Parameters: isp(I) - pointer to pointer to state table entry */ 37702393Syz155240 /* */ 37712393Syz155240 /* Decrement the reference counter for this state table entry and free it */ 37722393Syz155240 /* if there are no more things using it. */ 37732393Syz155240 /* */ 37742393Syz155240 /* When operating in userland (ipftest), we have no timers to clear a state */ 37752393Syz155240 /* entry. Therefore, we make a few simple tests before deleting an entry */ 37762393Syz155240 /* outright. We compare states on each side looking for a combination of */ 37772393Syz155240 /* TIME_WAIT (should really be FIN_WAIT_2?) and LAST_ACK. Then we factor */ 37782393Syz155240 /* in packet direction with the interface list to make sure we don't */ 37792393Syz155240 /* prematurely delete an entry on a final inbound packet that's we're also */ 37802393Syz155240 /* supposed to route elsewhere. */ 37812393Syz155240 /* */ 37822393Syz155240 /* Internal parameters: */ 37832393Syz155240 /* state[0] = state of source (host that initiated connection) */ 37842393Syz155240 /* state[1] = state of dest (host that accepted the connection) */ 37852393Syz155240 /* */ 37862393Syz155240 /* dir == 0 : a packet from source to dest */ 37872393Syz155240 /* dir == 1 : a packet from dest to source */ 37882393Syz155240 /* ------------------------------------------------------------------------ */ 37893448Sdh155122 void fr_statederef(fin, isp, ifs) 37902393Syz155240 fr_info_t *fin; 37912393Syz155240 ipstate_t **isp; 37923448Sdh155122 ipf_stack_t *ifs; 37932393Syz155240 { 37942393Syz155240 ipstate_t *is = *isp; 37952393Syz155240 #if 0 37962393Syz155240 int nstate, ostate, dir, eol; 37972393Syz155240 37982393Syz155240 eol = 0; /* End-of-the-line flag. */ 37992393Syz155240 dir = fin->fin_rev; 38002393Syz155240 ostate = is->is_state[1 - dir]; 38012393Syz155240 nstate = is->is_state[dir]; 38022393Syz155240 /* 38032393Syz155240 * Determine whether this packet is local or routed. State entries 38042393Syz155240 * with us as the destination will have an interface list of 38052393Syz155240 * int1,-,-,int1. Entries with us as the origin run as -,int1,int1,-. 38062393Syz155240 */ 38072393Syz155240 if ((fin->fin_p == IPPROTO_TCP) && (fin->fin_out == 0)) { 38082393Syz155240 if ((strcmp(is->is_ifname[0], is->is_ifname[3]) == 0) && 38092393Syz155240 (strcmp(is->is_ifname[1], is->is_ifname[2]) == 0)) { 38102393Syz155240 if ((dir == 0) && 38112393Syz155240 (strcmp(is->is_ifname[1], "-") == 0) && 38122393Syz155240 (strcmp(is->is_ifname[0], "-") != 0)) { 38132393Syz155240 eol = 1; 38142393Syz155240 } else if ((dir == 1) && 38152393Syz155240 (strcmp(is->is_ifname[0], "-") == 0) && 38162393Syz155240 (strcmp(is->is_ifname[1], "-") != 0)) { 38172393Syz155240 eol = 1; 38182393Syz155240 } 38192393Syz155240 } 38202393Syz155240 } 38212393Syz155240 #endif 38222393Syz155240 38232393Syz155240 fin = fin; /* LINT */ 38242393Syz155240 is = *isp; 38252393Syz155240 *isp = NULL; 38263448Sdh155122 WRITE_ENTER(&ifs->ifs_ipf_state); 38272393Syz155240 is->is_ref--; 38282393Syz155240 if (is->is_ref == 0) { 38292393Syz155240 is->is_ref++; /* To counter ref-- in fr_delstate() */ 38303448Sdh155122 fr_delstate(is, ISL_EXPIRE, ifs); 38312393Syz155240 #ifndef _KERNEL 38322393Syz155240 #if 0 38332393Syz155240 } else if (((fin->fin_out == 1) || (eol == 1)) && 38342393Syz155240 ((ostate == IPF_TCPS_LAST_ACK) && 38352393Syz155240 (nstate == IPF_TCPS_TIME_WAIT))) { 38362393Syz155240 ; 38372393Syz155240 #else 38382393Syz155240 } else if ((is->is_sti.tqe_state[0] > IPF_TCPS_ESTABLISHED) || 38392393Syz155240 (is->is_sti.tqe_state[1] > IPF_TCPS_ESTABLISHED)) { 38402393Syz155240 #endif 38413448Sdh155122 fr_delstate(is, ISL_ORPHAN, ifs); 38422393Syz155240 #endif 38432393Syz155240 } 38443448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 38452393Syz155240 } 38462393Syz155240 38472393Syz155240 38482393Syz155240 /* ------------------------------------------------------------------------ */ 38492393Syz155240 /* Function: fr_setstatequeue */ 38502393Syz155240 /* Returns: Nil */ 38512393Syz155240 /* Parameters: is(I) - pointer to state structure */ 38522393Syz155240 /* rev(I) - forward(0) or reverse(1) direction */ 38532393Syz155240 /* Locks: ipf_state (read or write) */ 38542393Syz155240 /* */ 38552393Syz155240 /* Put the state entry on its default queue entry, using rev as a helped in */ 38562393Syz155240 /* determining which queue it should be placed on. */ 38572393Syz155240 /* ------------------------------------------------------------------------ */ 38583448Sdh155122 void fr_setstatequeue(is, rev, ifs) 38592393Syz155240 ipstate_t *is; 38602393Syz155240 int rev; 38613448Sdh155122 ipf_stack_t *ifs; 38622393Syz155240 { 38632393Syz155240 ipftq_t *oifq, *nifq; 38642393Syz155240 38652393Syz155240 38662393Syz155240 if ((is->is_sti.tqe_flags & TQE_RULEBASED) != 0) 38672393Syz155240 nifq = is->is_tqehead[rev]; 38682393Syz155240 else 38692393Syz155240 nifq = NULL; 38702393Syz155240 38712393Syz155240 if (nifq == NULL) { 38722393Syz155240 switch (is->is_p) 38732393Syz155240 { 38742393Syz155240 #ifdef USE_INET6 38752393Syz155240 case IPPROTO_ICMPV6 : 38762393Syz155240 if (rev == 1) 38773448Sdh155122 nifq = &ifs->ifs_ips_icmpacktq; 38782393Syz155240 else 38793448Sdh155122 nifq = &ifs->ifs_ips_icmptq; 38802393Syz155240 break; 38812393Syz155240 #endif 38822393Syz155240 case IPPROTO_ICMP : 38832393Syz155240 if (rev == 1) 38843448Sdh155122 nifq = &ifs->ifs_ips_icmpacktq; 38852393Syz155240 else 38863448Sdh155122 nifq = &ifs->ifs_ips_icmptq; 38872393Syz155240 break; 38882393Syz155240 case IPPROTO_TCP : 38893448Sdh155122 nifq = ifs->ifs_ips_tqtqb + is->is_state[rev]; 38902393Syz155240 break; 38912393Syz155240 38922393Syz155240 case IPPROTO_UDP : 38932393Syz155240 if (rev == 1) 38943448Sdh155122 nifq = &ifs->ifs_ips_udpacktq; 38952393Syz155240 else 38963448Sdh155122 nifq = &ifs->ifs_ips_udptq; 38972393Syz155240 break; 38982393Syz155240 38992393Syz155240 default : 39003448Sdh155122 nifq = &ifs->ifs_ips_iptq; 39012393Syz155240 break; 39022393Syz155240 } 39032393Syz155240 } 39042393Syz155240 39052393Syz155240 oifq = is->is_sti.tqe_ifq; 39062393Syz155240 /* 39072393Syz155240 * If it's currently on a timeout queue, move it from one queue to 39082393Syz155240 * another, else put it on the end of the newly determined queue. 39092393Syz155240 */ 39102393Syz155240 if (oifq != NULL) 39113448Sdh155122 fr_movequeue(&is->is_sti, oifq, nifq, ifs); 39122393Syz155240 else 39133448Sdh155122 fr_queueappend(&is->is_sti, nifq, is, ifs); 39142393Syz155240 return; 39152393Syz155240 } 39163448Sdh155122 39173448Sdh155122 39183448Sdh155122 /* ------------------------------------------------------------------------ */ 39193448Sdh155122 /* Function: fr_stateiter */ 39203448Sdh155122 /* Returns: int - 0 == success, else error */ 39213448Sdh155122 /* Parameters: token(I) - pointer to ipftoken structure */ 39223448Sdh155122 /* itp(I) - pointer to ipfgeniter structure */ 39233448Sdh155122 /* */ 39243448Sdh155122 /* This function handles the SIOCGENITER ioctl for the state tables and */ 39253448Sdh155122 /* walks through the list of entries in the state table list (ips_list.) */ 39263448Sdh155122 /* ------------------------------------------------------------------------ */ 39273448Sdh155122 static int fr_stateiter(token, itp, ifs) 39283448Sdh155122 ipftoken_t *token; 39293448Sdh155122 ipfgeniter_t *itp; 39303448Sdh155122 ipf_stack_t *ifs; 39313448Sdh155122 { 39323448Sdh155122 ipstate_t *is, *next, zero; 39333448Sdh155122 int error; 39343448Sdh155122 39353448Sdh155122 if (itp->igi_data == NULL) 39363448Sdh155122 return EFAULT; 39373448Sdh155122 39383448Sdh155122 if (itp->igi_type != IPFGENITER_STATE) 39393448Sdh155122 return EINVAL; 39403448Sdh155122 39413448Sdh155122 is = token->ipt_data; 39423448Sdh155122 if (is == (void *)-1) { 39433448Sdh155122 ipf_freetoken(token, ifs); 39443448Sdh155122 return ESRCH; 39453448Sdh155122 } 39463448Sdh155122 39473448Sdh155122 READ_ENTER(&ifs->ifs_ipf_state); 39483448Sdh155122 if (is == NULL) { 39493448Sdh155122 next = ifs->ifs_ips_list; 39503448Sdh155122 } else { 39513448Sdh155122 next = is->is_next; 39523448Sdh155122 } 39533448Sdh155122 39543448Sdh155122 if (next != NULL) { 39553448Sdh155122 /* 39563448Sdh155122 * If we find a state entry to use, bump its reference count 39573448Sdh155122 * so that it can be used for is_next when we come back. 39583448Sdh155122 */ 39593448Sdh155122 MUTEX_ENTER(&next->is_lock); 39603448Sdh155122 next->is_ref++; 39613448Sdh155122 MUTEX_EXIT(&next->is_lock); 39623448Sdh155122 token->ipt_data = next; 39633448Sdh155122 } else { 39643448Sdh155122 bzero(&zero, sizeof(zero)); 39653448Sdh155122 next = &zero; 39663448Sdh155122 token->ipt_data = (void *)-1; 39673448Sdh155122 } 39683448Sdh155122 RWLOCK_EXIT(&ifs->ifs_ipf_state); 39693448Sdh155122 39703448Sdh155122 /* 39713448Sdh155122 * If we had a prior pointer to a state entry, release it. 39723448Sdh155122 */ 39733448Sdh155122 if (is != NULL) { 39743448Sdh155122 fr_statederef(NULL, &is, ifs); 39753448Sdh155122 } 39763448Sdh155122 39773448Sdh155122 /* 39783448Sdh155122 * This should arguably be via fr_outobj() so that the state 39793448Sdh155122 * structure can (if required) be massaged going out. 39803448Sdh155122 */ 39813448Sdh155122 error = COPYOUT(next, itp->igi_data, sizeof(*next)); 39823448Sdh155122 if (error != 0) 39833448Sdh155122 error = EFAULT; 39843448Sdh155122 39853448Sdh155122 return error; 39863448Sdh155122 } 39873448Sdh155122 3988