Author: ume
Date: Wed Dec  2 14:32:01 2009
New Revision: 200027
URL: http://svn.freebsd.org/changeset/base/200027

Log:
  Teach an IPv6 to send_pkt() and ipfw_tick().
  It fixes the issue which keep-alive doesn't work for an IPv6.
  
  PR:           kern/117234
  Submitted by: mlaier, Joost Bekkers <joost__at__jodocus.org>
  MFC after:    1 month

Modified:
  head/sys/netinet/ipfw/ip_fw2.c

Modified: head/sys/netinet/ipfw/ip_fw2.c
==============================================================================
--- head/sys/netinet/ipfw/ip_fw2.c      Wed Dec  2 13:24:21 2009        
(r200026)
+++ head/sys/netinet/ipfw/ip_fw2.c      Wed Dec  2 14:32:01 2009        
(r200027)
@@ -94,6 +94,7 @@ __FBSDID("$FreeBSD$");
 #include <netinet/icmp6.h>
 #ifdef INET6
 #include <netinet6/scope6_var.h>
+#include <netinet6/ip6_var.h>
 #endif
 
 #include <machine/in_cksum.h>  /* XXX for in_cksum */
@@ -249,6 +250,10 @@ static struct mtx ipfw_dyn_mtx;            /* mute
 #define        IPFW_DYN_UNLOCK()       mtx_unlock(&ipfw_dyn_mtx)
 #define        IPFW_DYN_LOCK_ASSERT()  mtx_assert(&ipfw_dyn_mtx, MA_OWNED)
 
+static struct mbuf *send_pkt(struct mbuf *, struct ipfw_flow_id *,
+    u_int32_t, u_int32_t, int);
+
+
 /*
  * Timeouts for various events in handing dynamic rules.
  */
@@ -708,60 +713,18 @@ send_reject6(struct ip_fw_args *args, in
        m = args->m;
        if (code == ICMP6_UNREACH_RST && args->f_id.proto == IPPROTO_TCP) {
                struct tcphdr *tcp;
-               tcp_seq ack, seq;
-               int flags;
-               struct {
-                       struct ip6_hdr ip6;
-                       struct tcphdr th;
-               } ti;
                tcp = (struct tcphdr *)((char *)ip6 + hlen);
 
-               if ((tcp->th_flags & TH_RST) != 0) {
-                       m_freem(m);
-                       args->m = NULL;
-                       return;
-               }
-
-               ti.ip6 = *ip6;
-               ti.th = *tcp;
-               ti.th.th_seq = ntohl(ti.th.th_seq);
-               ti.th.th_ack = ntohl(ti.th.th_ack);
-               ti.ip6.ip6_nxt = IPPROTO_TCP;
-
-               if (ti.th.th_flags & TH_ACK) {
-                       ack = 0;
-                       seq = ti.th.th_ack;
-                       flags = TH_RST;
-               } else {
-                       ack = ti.th.th_seq;
-                       if ((m->m_flags & M_PKTHDR) != 0) {
-                               /*
-                                * total new data to ACK is:
-                                * total packet length,
-                                * minus the header length,
-                                * minus the tcp header length.
-                                */
-                               ack += m->m_pkthdr.len - hlen
-                                       - (ti.th.th_off << 2);
-                       } else if (ip6->ip6_plen) {
-                               ack += ntohs(ip6->ip6_plen) + sizeof(*ip6) -
-                                   hlen - (ti.th.th_off << 2);
-                       } else {
-                               m_freem(m);
-                               return;
-                       }
-                       if (tcp->th_flags & TH_SYN)
-                               ack++;
-                       seq = 0;
-                       flags = TH_RST|TH_ACK;
+               if ((tcp->th_flags & TH_RST) == 0) {
+                       struct mbuf *m0;
+                       m0 = send_pkt(args->m, &(args->f_id),
+                           ntohl(tcp->th_seq), ntohl(tcp->th_ack),
+                           tcp->th_flags | TH_RST);
+                       if (m0 != NULL)
+                               ip6_output(m0, NULL, NULL, 0, NULL, NULL,
+                                   NULL);
                }
-               bcopy(&ti, ip6, sizeof(ti));
-               /*
-                * m is only used to recycle the mbuf
-                * The data in it is never read so we don't need
-                * to correct the offsets or anything
-                */
-               tcp_respond(NULL, ip6, tcp, m, ack, seq, flags);
+               m_freem(m);
        } else if (code != ICMP6_UNREACH_RST) { /* Send an ICMPv6 unreach. */
 #if 0
                /*
@@ -1649,13 +1612,16 @@ send_pkt(struct mbuf *replyto, struct ip
     u_int32_t ack, int flags)
 {
        struct mbuf *m;
-       struct ip *ip;
-       struct tcphdr *tcp;
+       int len, dir;
+       struct ip *h = NULL;            /* stupid compiler */
+#ifdef INET6
+       struct ip6_hdr *h6 = NULL;
+#endif
+       struct tcphdr *th = NULL;
 
        MGETHDR(m, M_DONTWAIT, MT_DATA);
-       if (m == 0)
+       if (m == NULL)
                return (NULL);
-       m->m_pkthdr.rcvif = (struct ifnet *)0;
 
        M_SETFIB(m, id->fib);
 #ifdef MAC
@@ -1667,67 +1633,118 @@ send_pkt(struct mbuf *replyto, struct ip
        (void)replyto;          /* don't warn about unused arg */
 #endif
 
-       m->m_pkthdr.len = m->m_len = sizeof(struct ip) + sizeof(struct tcphdr);
+       switch (id->addr_type) {
+       case 4:
+               len = sizeof(struct ip) + sizeof(struct tcphdr);
+               break;
+#ifdef INET6
+       case 6:
+               len = sizeof(struct ip6_hdr) + sizeof(struct tcphdr);
+               break;
+#endif
+       default:
+               /* XXX: log me?!? */
+               m_freem(m);
+               return (NULL);
+       }
+       dir = ((flags & (TH_SYN | TH_RST)) == TH_SYN);
+
        m->m_data += max_linkhdr;
+       m->m_flags |= M_SKIP_FIREWALL;
+       m->m_pkthdr.len = m->m_len = len;
+       m->m_pkthdr.rcvif = NULL;
+       bzero(m->m_data, len);
+
+       switch (id->addr_type) {
+       case 4:
+               h = mtod(m, struct ip *);
+
+               /* prepare for checksum */
+               h->ip_p = IPPROTO_TCP;
+               h->ip_len = htons(sizeof(struct tcphdr));
+               if (dir) {
+                       h->ip_src.s_addr = htonl(id->src_ip);
+                       h->ip_dst.s_addr = htonl(id->dst_ip);
+               } else {
+                       h->ip_src.s_addr = htonl(id->dst_ip);
+                       h->ip_dst.s_addr = htonl(id->src_ip);
+               }
 
-       ip = mtod(m, struct ip *);
-       bzero(ip, m->m_len);
-       tcp = (struct tcphdr *)(ip + 1); /* no IP options */
-       ip->ip_p = IPPROTO_TCP;
-       tcp->th_off = 5;
-       /*
-        * Assume we are sending a RST (or a keepalive in the reverse
-        * direction), swap src and destination addresses and ports.
-        */
-       ip->ip_src.s_addr = htonl(id->dst_ip);
-       ip->ip_dst.s_addr = htonl(id->src_ip);
-       tcp->th_sport = htons(id->dst_port);
-       tcp->th_dport = htons(id->src_port);
-       if (flags & TH_RST) {   /* we are sending a RST */
+               th = (struct tcphdr *)(h + 1);
+               break;
+#ifdef INET6
+       case 6:
+               h6 = mtod(m, struct ip6_hdr *);
+
+               /* prepare for checksum */
+               h6->ip6_nxt = IPPROTO_TCP;
+               h6->ip6_plen = htons(sizeof(struct tcphdr));
+               if (dir) {
+                       h6->ip6_src = id->src_ip6;
+                       h6->ip6_dst = id->dst_ip6;
+               } else {
+                       h6->ip6_src = id->dst_ip6;
+                       h6->ip6_dst = id->src_ip6;
+               }
+
+               th = (struct tcphdr *)(h6 + 1);
+               break;
+#endif
+       }
+
+       if (dir) {
+               th->th_sport = htons(id->src_port);
+               th->th_dport = htons(id->dst_port);
+       } else {
+               th->th_sport = htons(id->dst_port);
+               th->th_dport = htons(id->src_port);
+       }
+       th->th_off = sizeof(struct tcphdr) >> 2;
+
+       if (flags & TH_RST) {
                if (flags & TH_ACK) {
-                       tcp->th_seq = htonl(ack);
-                       tcp->th_ack = htonl(0);
-                       tcp->th_flags = TH_RST;
+                       th->th_seq = htonl(ack);
+                       th->th_flags = TH_RST;
                } else {
                        if (flags & TH_SYN)
                                seq++;
-                       tcp->th_seq = htonl(0);
-                       tcp->th_ack = htonl(seq);
-                       tcp->th_flags = TH_RST | TH_ACK;
+                       th->th_ack = htonl(seq);
+                       th->th_flags = TH_RST | TH_ACK;
                }
        } else {
                /*
-                * We are sending a keepalive. flags & TH_SYN determines
-                * the direction, forward if set, reverse if clear.
-                * NOTE: seq and ack are always assumed to be correct
-                * as set by the caller. This may be confusing...
+                * Keepalive - use caller provided sequence numbers
                 */
-               if (flags & TH_SYN) {
-                       /*
-                        * we have to rewrite the correct addresses!
-                        */
-                       ip->ip_dst.s_addr = htonl(id->dst_ip);
-                       ip->ip_src.s_addr = htonl(id->src_ip);
-                       tcp->th_dport = htons(id->dst_port);
-                       tcp->th_sport = htons(id->src_port);
-               }
-               tcp->th_seq = htonl(seq);
-               tcp->th_ack = htonl(ack);
-               tcp->th_flags = TH_ACK;
+               th->th_seq = htonl(seq);
+               th->th_ack = htonl(ack);
+               th->th_flags = TH_ACK;
+       }
+
+       switch (id->addr_type) {
+       case 4:
+               th->th_sum = in_cksum(m, len);
+
+               /* finish the ip header */
+               h->ip_v = 4;
+               h->ip_hl = sizeof(*h) >> 2;
+               h->ip_tos = IPTOS_LOWDELAY;
+               h->ip_off = 0;
+               h->ip_len = len;
+               h->ip_ttl = V_ip_defttl;
+               h->ip_sum = 0;
+               break;
+#ifdef INET6
+       case 6:
+               th->th_sum = in6_cksum(m, IPPROTO_TCP, sizeof(*h6),
+                   sizeof(struct tcphdr));
+
+               /* finish the ip6 header */
+               h6->ip6_vfc |= IPV6_VERSION;
+               h6->ip6_hlim = IPV6_DEFHLIM;
+               break;
+#endif
        }
-       /*
-        * set ip_len to the payload size so we can compute
-        * the tcp checksum on the pseudoheader
-        * XXX check this, could save a couple of words ?
-        */
-       ip->ip_len = htons(sizeof(struct tcphdr));
-       tcp->th_sum = in_cksum(m, m->m_pkthdr.len);
-       /*
-        * now fill fields left out earlier
-        */
-       ip->ip_ttl = V_ip_defttl;
-       ip->ip_len = m->m_pkthdr.len;
-       m->m_flags |= M_SKIP_FIREWALL;
+
        return (m);
 }
 
@@ -4530,13 +4547,16 @@ static void
 ipfw_tick(void * vnetx) 
 {
        struct mbuf *m0, *m, *mnext, **mtailp;
+#ifdef INET6
+       struct mbuf *m6, **m6_tailp;
+#endif
        int i;
        ipfw_dyn_rule *q;
 #ifdef VIMAGE
        struct vnet *vp = vnetx;
 #endif
 
-        CURVNET_SET(vp);
+       CURVNET_SET(vp);
        if (V_dyn_keepalive == 0 || V_ipfw_dyn_v == NULL || V_dyn_count == 0)
                goto done;
 
@@ -4548,6 +4568,10 @@ ipfw_tick(void * vnetx) 
         */
        m0 = NULL;
        mtailp = &m0;
+#ifdef INET6
+       m6 = NULL;
+       m6_tailp = &m6;
+#endif
        IPFW_DYN_LOCK();
        for (i = 0 ; i < V_curr_dyn_buckets ; i++) {
                for (q = V_ipfw_dyn_v[i] ; q ; q = q->next ) {
@@ -4563,14 +4587,37 @@ ipfw_tick(void * vnetx) 
                        if (TIME_LEQ(q->expire, time_uptime))
                                continue;       /* too late, rule expired */
 
-                       *mtailp = send_pkt(NULL, &(q->id), q->ack_rev - 1,
+                       m = send_pkt(NULL, &(q->id), q->ack_rev - 1,
                                q->ack_fwd, TH_SYN);
-                       if (*mtailp != NULL)
-                               mtailp = &(*mtailp)->m_nextpkt;
-                       *mtailp = send_pkt(NULL, &(q->id), q->ack_fwd - 1,
+                       mnext = send_pkt(NULL, &(q->id), q->ack_fwd - 1,
                                q->ack_rev, 0);
-                       if (*mtailp != NULL)
-                               mtailp = &(*mtailp)->m_nextpkt;
+
+                       switch (q->id.addr_type) {
+                       case 4:
+                               if (m != NULL) {
+                                       *mtailp = m;
+                                       mtailp = &(*mtailp)->m_nextpkt;
+                               }
+                               if (mnext != NULL) {
+                                       *mtailp = mnext;
+                                       mtailp = &(*mtailp)->m_nextpkt;
+                               }
+                               break;
+#ifdef INET6
+                       case 6:
+                               if (m != NULL) {
+                                       *m6_tailp = m;
+                                       m6_tailp = &(*m6_tailp)->m_nextpkt;
+                               }
+                               if (mnext != NULL) {
+                                       *m6_tailp = mnext;
+                                       m6_tailp = &(*m6_tailp)->m_nextpkt;
+                               }
+                               break;
+#endif
+                       }
+
+                       m = mnext = NULL;
                }
        }
        IPFW_DYN_UNLOCK();
@@ -4579,6 +4626,13 @@ ipfw_tick(void * vnetx) 
                m->m_nextpkt = NULL;
                ip_output(m, NULL, NULL, 0, NULL, NULL);
        }
+#ifdef INET6
+       for (m = mnext = m6; m != NULL; m = mnext) {
+               mnext = m->m_nextpkt;
+               m->m_nextpkt = NULL;
+               ip6_output(m, NULL, NULL, 0, NULL, NULL, NULL);
+       }
+#endif
 done:
        callout_reset(&V_ipfw_timeout, V_dyn_keepalive_period * hz,
                      ipfw_tick, vnetx);
_______________________________________________
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"

Reply via email to