Index: net/if_pfsync.c =================================================================== RCS file: /cvs/src/sys/net/if_pfsync.c,v diff -u -p -r1.331 if_pfsync.c --- net/if_pfsync.c 2 Mar 2025 21:28:32 -0000 1.331 +++ net/if_pfsync.c 3 Jun 2025 03:59:00 -0000 @@ -2068,45 +2068,22 @@ pfsync_deferrals_task(void *arg) static void pfsync_defer_output(struct pfsync_deferral *pd) { - struct pf_pdesc pdesc; struct pf_state *st = pd->pd_st; - if (st->rt == PF_ROUTETO) { - if (pf_setup_pdesc(&pdesc, st->key[PF_SK_WIRE]->af, - st->direction, NULL, pd->pd_m, NULL) != PF_PASS) - return; - switch (st->key[PF_SK_WIRE]->af) { - case AF_INET: - pf_route(&pdesc, st); - break; + switch (st->key[PF_SK_WIRE]->af) { + case AF_INET: + ip_output(pd->pd_m, NULL, NULL, 0, NULL, NULL, 0); + break; #ifdef INET6 - case AF_INET6: - pf_route6(&pdesc, st); - break; + case AF_INET6: + ip6_output(pd->pd_m, NULL, NULL, 0, NULL, NULL); + break; #endif /* INET6 */ - default: - unhandled_af(st->key[PF_SK_WIRE]->af); - } - pd->pd_m = pdesc.m; - } else { - switch (st->key[PF_SK_WIRE]->af) { - case AF_INET: - ip_output(pd->pd_m, NULL, NULL, 0, NULL, NULL, 0); - break; -#ifdef INET6 - case AF_INET6: - ip6_output(pd->pd_m, NULL, NULL, 0, NULL, NULL); - break; -#endif /* INET6 */ - default: - unhandled_af(st->key[PF_SK_WIRE]->af); - } - - pd->pd_m = NULL; + default: + unhandled_af(st->key[PF_SK_WIRE]->af); } pf_state_unref(st); - m_freem(pd->pd_m); pool_put(&pfsync_deferrals_pool, pd); } Index: net/pf.c =================================================================== RCS file: /cvs/src/sys/net/pf.c,v diff -u -p -r1.1212 pf.c --- net/pf.c 30 May 2025 13:08:07 -0000 1.1212 +++ net/pf.c 3 Jun 2025 03:59:00 -0000 @@ -6604,17 +6604,12 @@ pf_rtlabel_match(struct pf_addr *addr, s return (ret); } -/* pf_route() may change pd->m, adjust local copies after calling */ -void -pf_route(struct pf_pdesc *pd, struct pf_state *st) +static void +pf_route_af(struct pf_pdesc *pd, struct pf_state *st, + void (*send)(struct mbuf *)) { struct mbuf *m0; - struct mbuf_list ml; - struct sockaddr_in *dst, sin; - struct rtentry *rt = NULL; - struct ip *ip; - struct ifnet *ifp = NULL; - unsigned int rtableid; + struct m_tag *mtag; if (pd->m->m_pkthdr.pf.routed++ > 3) { m_freem(pd->m); @@ -6623,220 +6618,49 @@ pf_route(struct pf_pdesc *pd, struct pf_ } if (st->rt == PF_DUPTO) { - if ((m0 = m_dup_pkt(pd->m, max_linkhdr, M_NOWAIT)) == NULL) - return; - } else { - if ((st->rt == PF_REPLYTO) == (st->direction == pd->dir)) + m0 = m_dup_pkt(pd->m, max_linkhdr, M_NOWAIT); + if (m0 == NULL) return; + } else if ((st->rt == PF_REPLYTO) == (st->direction == pd->dir)) + return; + else m0 = pd->m; - pd->m = NULL; - } - if (m0->m_len < sizeof(struct ip)) { - DPFPRINTF(LOG_ERR, - "%s: m0->m_len < sizeof(struct ip)", __func__); - goto bad; - } - - ip = mtod(m0, struct ip *); - - if (pd->dir == PF_IN) { - if (ip->ip_ttl <= IPTTLDEC) { - if (st->rt != PF_DUPTO) { - pf_send_icmp(m0, ICMP_TIMXCEED, - ICMP_TIMXCEED_INTRANS, 0, - pd->af, st->rule.ptr, pd->rdomain); - } - goto bad; + mtag = m_tag_find(m0, PACKET_TAG_PF_ROUTE, NULL); + if (mtag == NULL) { + mtag = m_tag_get(PACKET_TAG_PF_ROUTE, sizeof(st->rt_addr), + M_NOWAIT); + if (mtag == NULL) { + if (m0 == pd->m) + pd->m = NULL; + m_freem(m0); + return; } - ip->ip_ttl -= IPTTLDEC; - } - - memset(&sin, 0, sizeof(sin)); - dst = &sin; - dst->sin_family = AF_INET; - dst->sin_len = sizeof(*dst); - dst->sin_addr = st->rt_addr.v4; - rtableid = m0->m_pkthdr.ph_rtableid; - rt = rtalloc_mpath(sintosa(dst), &ip->ip_src.s_addr, rtableid); - if (!rtisvalid(rt)) { - if (st->rt != PF_DUPTO) { - pf_send_icmp(m0, ICMP_UNREACH, ICMP_UNREACH_HOST, - 0, pd->af, st->rule.ptr, pd->rdomain); - } - ipstat_inc(ips_noroute); - goto bad; + m_tag_prepend(m0, mtag); } - ifp = if_get(rt->rt_ifidx); - if (ifp == NULL) - goto bad; - - /* A locally generated packet may have invalid source address. */ - if ((ntohl(ip->ip_src.s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET && - (ifp->if_flags & IFF_LOOPBACK) == 0) - ip->ip_src = ifatoia(rt->rt_ifa)->ia_addr.sin_addr; + *(struct pf_addr *)(mtag + 1) = st->rt_addr; - if (st->rt != PF_DUPTO && pd->dir == PF_IN) { - if (pf_test(AF_INET, PF_OUT, ifp, &m0) != PF_PASS) - goto bad; - else if (m0 == NULL) - goto done; - if (m0->m_len < sizeof(struct ip)) { - DPFPRINTF(LOG_ERR, - "%s: m0->m_len < sizeof(struct ip)", __func__); - goto bad; - } - ip = mtod(m0, struct ip *); - } - - if (if_output_tso(ifp, &m0, sintosa(dst), rt, ifp->if_mtu) || - m0 == NULL) - goto done; - - /* - * Too large for interface; fragment if possible. - * Must be able to put at least 8 bytes per fragment. - */ - if (ip->ip_off & htons(IP_DF)) { - ipstat_inc(ips_cantfrag); - if (st->rt != PF_DUPTO) - pf_send_icmp(m0, ICMP_UNREACH, ICMP_UNREACH_NEEDFRAG, - ifp->if_mtu, pd->af, st->rule.ptr, pd->rdomain); - goto bad; - } - - if (ip_fragment(m0, &ml, ifp, ifp->if_mtu) || - if_output_ml(ifp, &ml, sintosa(dst), rt)) - goto done; - ipstat_inc(ips_fragmented); + if (st->rt == PF_DUPTO) { + SET(m0->m_pkthdr.pf.flags, PF_TAG_GENERATED); + (*send)(m0); + } else if (pd->dir == PF_OUT) + SET(m0->m_pkthdr.pf.flags, PF_TAG_REROUTE); +} -done: - if_put(ifp); - rtfree(rt); - return; - -bad: - m_freem(m0); - goto done; +/* pf_route() may change pd->m, adjust local copies after calling */ +void +pf_route(struct pf_pdesc *pd, struct pf_state *st) +{ + pf_route_af(pd, st, ip_send); } #ifdef INET6 -/* pf_route6() may change pd->m, adjust local copies after calling */ void pf_route6(struct pf_pdesc *pd, struct pf_state *st) { - struct mbuf *m0; - struct sockaddr_in6 *dst, sin6; - struct rtentry *rt = NULL; - struct ip6_hdr *ip6; - struct ifnet *ifp = NULL; - struct m_tag *mtag; - unsigned int rtableid; - - if (pd->m->m_pkthdr.pf.routed++ > 3) { - m_freem(pd->m); - pd->m = NULL; - return; - } - - if (st->rt == PF_DUPTO) { - if ((m0 = m_dup_pkt(pd->m, max_linkhdr, M_NOWAIT)) == NULL) - return; - } else { - if ((st->rt == PF_REPLYTO) == (st->direction == pd->dir)) - return; - m0 = pd->m; - pd->m = NULL; - } - - if (m0->m_len < sizeof(struct ip6_hdr)) { - DPFPRINTF(LOG_ERR, - "%s: m0->m_len < sizeof(struct ip6_hdr)", __func__); - goto bad; - } - ip6 = mtod(m0, struct ip6_hdr *); - - if (pd->dir == PF_IN) { - if (ip6->ip6_hlim <= IPV6_HLIMDEC) { - if (st->rt != PF_DUPTO) { - pf_send_icmp(m0, ICMP6_TIME_EXCEEDED, - ICMP6_TIME_EXCEED_TRANSIT, 0, - pd->af, st->rule.ptr, pd->rdomain); - } - goto bad; - } - ip6->ip6_hlim -= IPV6_HLIMDEC; - } - - memset(&sin6, 0, sizeof(sin6)); - dst = &sin6; - dst->sin6_family = AF_INET6; - dst->sin6_len = sizeof(*dst); - dst->sin6_addr = st->rt_addr.v6; - rtableid = m0->m_pkthdr.ph_rtableid; - - rt = rtalloc_mpath(sin6tosa(dst), &ip6->ip6_src.s6_addr32[0], - rtableid); - if (!rtisvalid(rt)) { - if (st->rt != PF_DUPTO) { - pf_send_icmp(m0, ICMP6_DST_UNREACH, - ICMP6_DST_UNREACH_NOROUTE, 0, - pd->af, st->rule.ptr, pd->rdomain); - } - ip6stat_inc(ip6s_noroute); - goto bad; - } - - ifp = if_get(rt->rt_ifidx); - if (ifp == NULL) - goto bad; - - /* A locally generated packet may have invalid source address. */ - if (IN6_IS_ADDR_LOOPBACK(&ip6->ip6_src) && - (ifp->if_flags & IFF_LOOPBACK) == 0) - ip6->ip6_src = ifatoia6(rt->rt_ifa)->ia_addr.sin6_addr; - - if (st->rt != PF_DUPTO && pd->dir == PF_IN) { - if (pf_test(AF_INET6, PF_OUT, ifp, &m0) != PF_PASS) - goto bad; - else if (m0 == NULL) - goto done; - if (m0->m_len < sizeof(struct ip6_hdr)) { - DPFPRINTF(LOG_ERR, - "%s: m0->m_len < sizeof(struct ip6_hdr)", __func__); - goto bad; - } - } - - /* - * If packet has been reassembled by PF earlier, we have to - * use pf_refragment6() here to turn it back to fragments. - */ - if ((mtag = m_tag_find(m0, PACKET_TAG_PF_REASSEMBLED, NULL))) { - (void) pf_refragment6(&m0, mtag, dst, ifp, rt); - goto done; - } - - if (if_output_tso(ifp, &m0, sin6tosa(dst), rt, ifp->if_mtu) || - m0 == NULL) - goto done; - - ip6stat_inc(ip6s_cantfrag); - if (st->rt != PF_DUPTO) - pf_send_icmp(m0, ICMP6_PACKET_TOO_BIG, 0, - ifp->if_mtu, pd->af, st->rule.ptr, pd->rdomain); - goto bad; - -done: - if_put(ifp); - rtfree(rt); - return; - -bad: - m_freem(m0); - goto done; + pf_route_af(pd, st, ip6_send); } #endif /* INET6 */ @@ -8106,6 +7930,9 @@ pf_ouraddr(struct mbuf *m) { struct pf_state_key *sk; + if (ISSET(m->m_pkthdr.ph_tagsset, PACKET_TAG_PF_ROUTE)) + return (0); + if (m->m_pkthdr.pf.flags & PF_TAG_DIVERTED) return (1); @@ -8125,6 +7952,16 @@ pf_ouraddr(struct mbuf *m) void pf_pkt_addr_changed(struct mbuf *m) { + struct m_tag *mtag; + + mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (mtag != NULL) { + m_tag_delete(m, mtag); + + KASSERTMSG(m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL) == NULL, + "mbuf %p had multiple PACKET_TAG_PF_ROUTE mbuf tags", m); + } + pf_mbuf_unlink_state_key(m); pf_mbuf_unlink_inpcb(m); } Index: netinet/ip_input.c =================================================================== RCS file: /cvs/src/sys/netinet/ip_input.c,v diff -u -p -r1.408 ip_input.c --- netinet/ip_input.c 20 May 2025 18:40:09 -0000 1.408 +++ netinet/ip_input.c 3 Jun 2025 03:59:00 -0000 @@ -1575,6 +1575,10 @@ ip_forward(struct mbuf *m, struct ifnet struct mbuf *mcopy; int error = 0, type = 0, code = 0, destmtu = 0; u_int32_t dest; + struct in_addr *rt_dst; +#if NPF > 0 + struct m_tag *rt_mtag; +#endif dest = 0; if (m->m_flags & (M_BCAST|M_MCAST) || in_canforward(ip->ip_dst) == 0) { @@ -1586,12 +1590,21 @@ ip_forward(struct mbuf *m, struct ifnet icmp_error(m, ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS, dest, 0); goto done; } + rt_dst = &ip->ip_dst; +#if NPF > 0 + rt_mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (rt_mtag != NULL) { + struct pf_addr *rt_addr = (struct pf_addr *)(rt_mtag + 1); + rt_dst = &rt_addr->v4; + SET(flags, IP_REDIRECT); + } +#endif if (ro == NULL) { ro = &iproute; ro->ro_rt = NULL; } - rt = route_mpath(ro, &ip->ip_dst, &ip->ip_src, rtableid); + rt = route_mpath(ro, rt_dst, &ip->ip_src, rtableid); if (rt == NULL) { ipstat_inc(ips_noroute); icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, dest, 0); Index: netinet/ip_output.c =================================================================== RCS file: /cvs/src/sys/netinet/ip_output.c,v diff -u -p -r1.409 ip_output.c --- netinet/ip_output.c 14 May 2025 14:32:15 -0000 1.409 +++ netinet/ip_output.c 3 Jun 2025 03:59:00 -0000 @@ -112,6 +112,10 @@ ip_output(struct mbuf *m, struct mbuf *o struct tdb *tdb = NULL; u_long mtu; u_int orig_rtableid; + struct in_addr *rt_dst; +#if NPF > 0 + struct m_tag *rt_mtag; +#endif NET_ASSERT_LOCKED(); @@ -150,6 +154,7 @@ ip_output(struct mbuf *m, struct mbuf *o #if NPF > 0 reroute: #endif + rt_dst = &ip->ip_dst; /* * Do a route lookup now in case we need the source address to @@ -162,11 +167,19 @@ reroute: ro->ro_rt = NULL; } +#if NPF > 0 + rt_mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (rt_mtag != NULL) { + struct pf_addr *rt_addr = (struct pf_addr *)(rt_mtag + 1); + rt_dst = &rt_addr->v4; + } +#endif + /* * If there is a cached route, check that it is to the same * destination and is still up. If not, free it and try again. */ - route_cache(ro, &ip->ip_dst, &ip->ip_src, m->m_pkthdr.ph_rtableid); + route_cache(ro, rt_dst, &ip->ip_src, m->m_pkthdr.ph_rtableid); dst = &ro->ro_dstsin; if ((IN_MULTICAST(ip->ip_dst.s_addr) || @@ -415,9 +428,6 @@ reroute: else if (m->m_pkthdr.pf.flags & PF_TAG_REROUTE) { /* tag as generated to skip over pf_test on rerun */ m->m_pkthdr.pf.flags |= PF_TAG_GENERATED; - if (ro == &iproute) - rtfree(ro->ro_rt); - ro = NULL; if_put(ifp); /* drop reference since target changed */ ifp = NULL; goto reroute; Index: netinet6/ip6_forward.c =================================================================== RCS file: /cvs/src/sys/netinet6/ip6_forward.c,v diff -u -p -r1.126 ip6_forward.c --- netinet6/ip6_forward.c 24 Feb 2025 20:16:14 -0000 1.126 +++ netinet6/ip6_forward.c 3 Jun 2025 03:59:00 -0000 @@ -102,6 +102,10 @@ ip6_forward(struct mbuf *m, struct route struct tdb *tdb = NULL; #endif /* IPSEC */ char src6[INET6_ADDRSTRLEN], dst6[INET6_ADDRSTRLEN]; + struct in6_addr *rt_dst; +#if NPF > 0 + struct m_tag *rt_mtag; +#endif /* * Do not forward packets to multicast destination (should be handled @@ -204,11 +208,20 @@ reroute: } #endif /* IPSEC */ + rt_dst = &ip6->ip6_dst; +#if NPF > 0 + rt_mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (rt_mtag != NULL) { + struct pf_addr *rt_addr = (struct pf_addr *)(rt_mtag + 1); + rt_dst = &rt_addr->v6; + } +#endif + if (ro == NULL) { ro = &iproute; ro->ro_rt = NULL; } - rt = route6_mpath(ro, &ip6->ip6_dst, &ip6->ip6_src, + rt = route6_mpath(ro, rt_dst, &ip6->ip6_src, m->m_pkthdr.ph_rtableid); if (rt == NULL) { ip6stat_inc(ip6s_noroute); Index: netinet6/ip6_input.c =================================================================== RCS file: /cvs/src/sys/netinet6/ip6_input.c,v diff -u -p -r1.272 ip6_input.c --- netinet6/ip6_input.c 27 May 2025 07:52:49 -0000 1.272 +++ netinet6/ip6_input.c 3 Jun 2025 03:59:00 -0000 @@ -99,7 +99,6 @@ #include #include "gif.h" -#include "bpfilter.h" #ifdef MROUTING #include @@ -371,7 +370,9 @@ ip6_input_if(struct mbuf **mp, int *offp u_int16_t src_scope, dst_scope; #if NPF > 0 struct in6_addr odst; + struct m_tag *rt_mtag; #endif + struct in6_addr *rt_dst; int flags = 0; KASSERT(*offp == 0); @@ -529,7 +530,6 @@ ip6_input_if(struct mbuf **mp, int *offp goto out; } - /* * Unicast check */ @@ -539,7 +539,17 @@ ip6_input_if(struct mbuf **mp, int *offp } else { ro = &ns->ns_route; } - rt = route6_mpath(ro, &ip6->ip6_dst, &ip6->ip6_src, + + rt_dst = &ip6->ip6_dst; +#if NPF > 0 + rt_mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (rt_mtag != NULL) { + struct pf_addr *rt_addr = (struct pf_addr *)(rt_mtag + 1); + rt_dst = &rt_addr->v6; + } +#endif + + rt = route6_mpath(ro, rt_dst, &ip6->ip6_src, m->m_pkthdr.ph_rtableid); /* Index: netinet6/ip6_output.c =================================================================== RCS file: /cvs/src/sys/netinet6/ip6_output.c,v diff -u -p -r1.299 ip6_output.c --- netinet6/ip6_output.c 14 May 2025 14:32:15 -0000 1.299 +++ netinet6/ip6_output.c 3 Jun 2025 03:59:00 -0000 @@ -178,6 +178,7 @@ ip6_output(struct mbuf *m, struct ip6_pk u_int32_t optlen = 0, plen = 0, unfragpartlen = 0; struct ip6_exthdrs exthdrs; struct in6_addr finaldst; + struct in6_addr *rt_dst; struct route *ro_pmtu = NULL; int hdrsplit = 0; u_int8_t sproto = 0; @@ -185,6 +186,9 @@ ip6_output(struct mbuf *m, struct ip6_pk #ifdef IPSEC struct tdb *tdb = NULL; #endif /* IPSEC */ +#if NPF > 0 + struct m_tag *rt_mtag; +#endif ip6 = mtod(m, struct ip6_hdr *); finaldst = ip6->ip6_dst; @@ -389,6 +393,7 @@ ip6_output(struct mbuf *m, struct ip6_pk #if NPF > 0 reroute: #endif + rt_dst = &ip6->ip6_dst; /* initialize cached route */ if (ro == NULL) { @@ -458,8 +463,16 @@ reroute: ifp = if_get(im6o->im6o_ifidx); } +#if NPF > 0 + rt_mtag = m_tag_find(m, PACKET_TAG_PF_ROUTE, NULL); + if (rt_mtag != NULL) { + struct pf_addr *rt_addr = (struct pf_addr *)(rt_mtag + 1); + rt_dst = &rt_addr->v6; + } +#endif + if (ifp == NULL) { - rt = in6_selectroute(&ip6->ip6_dst, opt, ro, + rt = in6_selectroute(rt_dst, opt, ro, m->m_pkthdr.ph_rtableid); if (rt == NULL) { ip6stat_inc(ip6s_noroute); @@ -482,7 +495,7 @@ reroute: goto bad; } } else { - route6_cache(ro, &ip6->ip6_dst, NULL, m->m_pkthdr.ph_rtableid); + route6_cache(ro, rt_dst, NULL, m->m_pkthdr.ph_rtableid); } if (rt && (rt->rt_flags & RTF_GATEWAY) && Index: sys/mbuf.h =================================================================== RCS file: /cvs/src/sys/sys/mbuf.h,v diff -u -p -r1.265 mbuf.h --- sys/mbuf.h 5 Nov 2024 13:15:13 -0000 1.265 +++ sys/mbuf.h 3 Jun 2025 03:59:00 -0000 @@ -482,12 +482,14 @@ struct m_tag *m_tag_next(struct mbuf *, #define PACKET_TAG_IPSEC_IN_DONE 0x0001 /* IPsec applied, in */ #define PACKET_TAG_IPSEC_OUT_DONE 0x0002 /* IPsec applied, out */ #define PACKET_TAG_IPSEC_FLOWINFO 0x0004 /* IPsec flowinfo */ +#define PACKET_TAG_PF_DEFER 0x0008 /* pfsync deferred packet */ #define PACKET_TAG_IP_OFFNXT 0x0010 /* IPv4 offset and next proto */ #define PACKET_TAG_IP6_OFFNXT 0x0020 /* IPv6 offset and next proto */ #define PACKET_TAG_WIREGUARD 0x0040 /* WireGuard data */ #define PACKET_TAG_GRE 0x0080 /* GRE processing done */ #define PACKET_TAG_DLT 0x0100 /* data link layer type */ #define PACKET_TAG_PF_DIVERT 0x0200 /* pf(4) diverted packet */ +#define PACKET_TAG_PF_ROUTE 0x0400 /* pf(4) route-to */ #define PACKET_TAG_PF_REASSEMBLED 0x0800 /* pf reassembled ipv6 packet */ #define PACKET_TAG_SRCROUTE 0x1000 /* IPv4 source routing options */ #define PACKET_TAG_TUNNEL 0x2000 /* Tunnel endpoint address */