1df8bae1dSRodney W. Grimes /* 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 14df8bae1dSRodney W. Grimes * must display the following acknowledgement: 15df8bae1dSRodney W. Grimes * This product includes software developed by the University of 16df8bae1dSRodney W. Grimes * California, Berkeley and its contributors. 17df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 18df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 19df8bae1dSRodney W. Grimes * without specific prior written permission. 20df8bae1dSRodney W. Grimes * 21df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31df8bae1dSRodney W. Grimes * SUCH DAMAGE. 32df8bae1dSRodney W. Grimes * 33df8bae1dSRodney W. Grimes * @(#)ip_input.c 8.2 (Berkeley) 1/4/94 3482c23ebaSBill Fenner * $Id: ip_input.c,v 1.50 1996/10/25 17:57:45 fenner Exp $ 3558938916SGarrett Wollman * $ANA: ip_input.c,v 1.5 1996/09/18 14:34:59 wollman Exp $ 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 3858938916SGarrett Wollman #define _IP_VHL 3958938916SGarrett Wollman 4074a9466cSGary Palmer #include "opt_ipfw.h" 4174a9466cSGary Palmer 4282c23ebaSBill Fenner #include <stddef.h> 4382c23ebaSBill Fenner 44df8bae1dSRodney W. Grimes #include <sys/param.h> 45df8bae1dSRodney W. Grimes #include <sys/systm.h> 46df8bae1dSRodney W. Grimes #include <sys/malloc.h> 47df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 48df8bae1dSRodney W. Grimes #include <sys/domain.h> 49df8bae1dSRodney W. Grimes #include <sys/protosw.h> 50df8bae1dSRodney W. Grimes #include <sys/socket.h> 51df8bae1dSRodney W. Grimes #include <sys/errno.h> 52df8bae1dSRodney W. Grimes #include <sys/time.h> 53df8bae1dSRodney W. Grimes #include <sys/kernel.h> 541025071fSGarrett Wollman #include <sys/syslog.h> 55b5e8ce9fSBruce Evans #include <sys/sysctl.h> 56df8bae1dSRodney W. Grimes 57df8bae1dSRodney W. Grimes #include <net/if.h> 5882c23ebaSBill Fenner #include <net/if_dl.h> 59df8bae1dSRodney W. Grimes #include <net/route.h> 60748e0b0aSGarrett Wollman #include <net/netisr.h> 61df8bae1dSRodney W. Grimes 62df8bae1dSRodney W. Grimes #include <netinet/in.h> 63df8bae1dSRodney W. Grimes #include <netinet/in_systm.h> 64b5e8ce9fSBruce Evans #include <netinet/in_var.h> 65df8bae1dSRodney W. Grimes #include <netinet/ip.h> 66df8bae1dSRodney W. Grimes #include <netinet/in_pcb.h> 67df8bae1dSRodney W. Grimes #include <netinet/in_var.h> 68df8bae1dSRodney W. Grimes #include <netinet/ip_var.h> 69df8bae1dSRodney W. Grimes #include <netinet/ip_icmp.h> 7058938916SGarrett Wollman #include <machine/in_cksum.h> 71df8bae1dSRodney W. Grimes 72f0068c4aSGarrett Wollman #include <sys/socketvar.h> 736ddbf1e2SGary Palmer 746ddbf1e2SGary Palmer #ifdef IPFIREWALL 756ddbf1e2SGary Palmer #include <netinet/ip_fw.h> 766ddbf1e2SGary Palmer #endif 776ddbf1e2SGary Palmer 781c5de19aSGarrett Wollman int rsvp_on = 0; 79f708ef1bSPoul-Henning Kamp static int ip_rsvp_on; 80f0068c4aSGarrett Wollman struct socket *ip_rsvpd; 81f0068c4aSGarrett Wollman 82d4fb926cSGarrett Wollman static int ipforwarding = 0; 830312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_FORWARDING, forwarding, CTLFLAG_RW, 840312fbe9SPoul-Henning Kamp &ipforwarding, 0, ""); 850312fbe9SPoul-Henning Kamp 86d4fb926cSGarrett Wollman static int ipsendredirects = 1; /* XXX */ 870312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SENDREDIRECTS, redirect, CTLFLAG_RW, 880312fbe9SPoul-Henning Kamp &ipsendredirects, 0, ""); 890312fbe9SPoul-Henning Kamp 90df8bae1dSRodney W. Grimes int ip_defttl = IPDEFTTL; 910312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFTTL, ttl, CTLFLAG_RW, 920312fbe9SPoul-Henning Kamp &ip_defttl, 0, ""); 930312fbe9SPoul-Henning Kamp 940312fbe9SPoul-Henning Kamp static int ip_dosourceroute = 0; 950312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SOURCEROUTE, sourceroute, CTLFLAG_RW, 960312fbe9SPoul-Henning Kamp &ip_dosourceroute, 0, ""); 97df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 980312fbe9SPoul-Henning Kamp static int ipprintfs = 0; 99df8bae1dSRodney W. Grimes #endif 100df8bae1dSRodney W. Grimes 101df8bae1dSRodney W. Grimes extern struct domain inetdomain; 102df8bae1dSRodney W. Grimes extern struct protosw inetsw[]; 103df8bae1dSRodney W. Grimes u_char ip_protox[IPPROTO_MAX]; 1040312fbe9SPoul-Henning Kamp static int ipqmaxlen = IFQ_MAXLEN; 105df8bae1dSRodney W. Grimes struct in_ifaddr *in_ifaddr; /* first inet address */ 106df8bae1dSRodney W. Grimes struct ifqueue ipintrq; 1070312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQMAXLEN, intr_queue_maxlen, CTLFLAG_RD, 1080312fbe9SPoul-Henning Kamp &ipintrq.ifq_maxlen, 0, ""); 1090312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQDROPS, intr_queue_drops, CTLFLAG_RD, 1100312fbe9SPoul-Henning Kamp &ipintrq.ifq_drops, 0, ""); 111df8bae1dSRodney W. Grimes 112f23b4c91SGarrett Wollman struct ipstat ipstat; 113f708ef1bSPoul-Henning Kamp static struct ipq ipq; 114f23b4c91SGarrett Wollman 1150312fbe9SPoul-Henning Kamp #ifdef IPCTL_DEFMTU 1160312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFMTU, mtu, CTLFLAG_RW, 1170312fbe9SPoul-Henning Kamp &ip_mtu, 0, ""); 1180312fbe9SPoul-Henning Kamp #endif 1190312fbe9SPoul-Henning Kamp 12058938916SGarrett Wollman #if !defined(COMPAT_IPFW) || COMPAT_IPFW == 1 12158938916SGarrett Wollman #undef COMPAT_IPFW 12258938916SGarrett Wollman #define COMPAT_IPFW 1 12358938916SGarrett Wollman #else 12458938916SGarrett Wollman #undef COMPAT_IPFW 12558938916SGarrett Wollman #endif 12658938916SGarrett Wollman 12758938916SGarrett Wollman #ifdef COMPAT_IPFW 12823bf9953SPoul-Henning Kamp /* Firewall hooks */ 12923bf9953SPoul-Henning Kamp ip_fw_chk_t *ip_fw_chk_ptr; 13023bf9953SPoul-Henning Kamp ip_fw_ctl_t *ip_fw_ctl_ptr; 131e7319babSPoul-Henning Kamp 132fed1c7e9SSøren Schmidt /* IP Network Address Translation (NAT) hooks */ 133fed1c7e9SSøren Schmidt ip_nat_t *ip_nat_ptr; 134fed1c7e9SSøren Schmidt ip_nat_ctl_t *ip_nat_ctl_ptr; 13558938916SGarrett Wollman #endif 136fed1c7e9SSøren Schmidt 137e7319babSPoul-Henning Kamp /* 138df8bae1dSRodney W. Grimes * We need to save the IP options in case a protocol wants to respond 139df8bae1dSRodney W. Grimes * to an incoming packet over the same route if the packet got here 140df8bae1dSRodney W. Grimes * using IP source routing. This allows connection establishment and 141df8bae1dSRodney W. Grimes * maintenance when the remote end is on a network that is not known 142df8bae1dSRodney W. Grimes * to us. 143df8bae1dSRodney W. Grimes */ 1440312fbe9SPoul-Henning Kamp static int ip_nhops = 0; 145df8bae1dSRodney W. Grimes static struct ip_srcrt { 146df8bae1dSRodney W. Grimes struct in_addr dst; /* final destination */ 147df8bae1dSRodney W. Grimes char nop; /* one NOP to align */ 148df8bae1dSRodney W. Grimes char srcopt[IPOPT_OFFSET + 1]; /* OPTVAL, OLEN and OFFSET */ 149df8bae1dSRodney W. Grimes struct in_addr route[MAX_IPOPTLEN/sizeof(struct in_addr)]; 150df8bae1dSRodney W. Grimes } ip_srcrt; 151df8bae1dSRodney W. Grimes 15293e0e116SJulian Elischer #ifdef IPDIVERT 15393e0e116SJulian Elischer /* 15493e0e116SJulian Elischer * Shared variable between ip_input() and ip_reass() to communicate 15593e0e116SJulian Elischer * about which packets, once assembled from fragments, get diverted, 15693e0e116SJulian Elischer * and to which port. 15793e0e116SJulian Elischer */ 15893e0e116SJulian Elischer static u_short frag_divert_port; 15993e0e116SJulian Elischer #endif 16093e0e116SJulian Elischer 161df8bae1dSRodney W. Grimes static void save_rte __P((u_char *, struct in_addr)); 1620312fbe9SPoul-Henning Kamp static void ip_deq __P((struct ipasfrag *)); 1630312fbe9SPoul-Henning Kamp static int ip_dooptions __P((struct mbuf *)); 1640312fbe9SPoul-Henning Kamp static void ip_enq __P((struct ipasfrag *, struct ipasfrag *)); 1650312fbe9SPoul-Henning Kamp static void ip_forward __P((struct mbuf *, int)); 1660312fbe9SPoul-Henning Kamp static void ip_freef __P((struct ipq *)); 1670312fbe9SPoul-Henning Kamp static struct ip * 1680312fbe9SPoul-Henning Kamp ip_reass __P((struct ipasfrag *, struct ipq *)); 1690312fbe9SPoul-Henning Kamp static struct in_ifaddr * 1700312fbe9SPoul-Henning Kamp ip_rtaddr __P((struct in_addr)); 1710312fbe9SPoul-Henning Kamp static void ipintr __P((void)); 172df8bae1dSRodney W. Grimes /* 173df8bae1dSRodney W. Grimes * IP initialization: fill in IP protocol switch table. 174df8bae1dSRodney W. Grimes * All protocols not implemented in kernel go to raw IP protocol handler. 175df8bae1dSRodney W. Grimes */ 176df8bae1dSRodney W. Grimes void 177df8bae1dSRodney W. Grimes ip_init() 178df8bae1dSRodney W. Grimes { 179df8bae1dSRodney W. Grimes register struct protosw *pr; 180df8bae1dSRodney W. Grimes register int i; 181df8bae1dSRodney W. Grimes 182df8bae1dSRodney W. Grimes pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW); 183df8bae1dSRodney W. Grimes if (pr == 0) 184df8bae1dSRodney W. Grimes panic("ip_init"); 185df8bae1dSRodney W. Grimes for (i = 0; i < IPPROTO_MAX; i++) 186df8bae1dSRodney W. Grimes ip_protox[i] = pr - inetsw; 187df8bae1dSRodney W. Grimes for (pr = inetdomain.dom_protosw; 188df8bae1dSRodney W. Grimes pr < inetdomain.dom_protoswNPROTOSW; pr++) 189df8bae1dSRodney W. Grimes if (pr->pr_domain->dom_family == PF_INET && 190df8bae1dSRodney W. Grimes pr->pr_protocol && pr->pr_protocol != IPPROTO_RAW) 191df8bae1dSRodney W. Grimes ip_protox[pr->pr_protocol] = pr - inetsw; 192df8bae1dSRodney W. Grimes ipq.next = ipq.prev = &ipq; 193df8bae1dSRodney W. Grimes ip_id = time.tv_sec & 0xffff; 194df8bae1dSRodney W. Grimes ipintrq.ifq_maxlen = ipqmaxlen; 195b83e4314SPoul-Henning Kamp #ifdef IPFIREWALL 196b83e4314SPoul-Henning Kamp ip_fw_init(); 197b83e4314SPoul-Henning Kamp #endif 198fed1c7e9SSøren Schmidt #ifdef IPNAT 199fed1c7e9SSøren Schmidt ip_nat_init(); 200fed1c7e9SSøren Schmidt #endif 201fed1c7e9SSøren Schmidt 202df8bae1dSRodney W. Grimes } 203df8bae1dSRodney W. Grimes 2040312fbe9SPoul-Henning Kamp static struct sockaddr_in ipaddr = { sizeof(ipaddr), AF_INET }; 205f708ef1bSPoul-Henning Kamp static struct route ipforward_rt; 206df8bae1dSRodney W. Grimes 207df8bae1dSRodney W. Grimes /* 208df8bae1dSRodney W. Grimes * Ip input routine. Checksum and byte swap header. If fragmented 209df8bae1dSRodney W. Grimes * try to reassemble. Process options. Pass to next level. 210df8bae1dSRodney W. Grimes */ 211c67b1d17SGarrett Wollman void 212c67b1d17SGarrett Wollman ip_input(struct mbuf *m) 213df8bae1dSRodney W. Grimes { 21423bf9953SPoul-Henning Kamp struct ip *ip; 21523bf9953SPoul-Henning Kamp struct ipq *fp; 21623bf9953SPoul-Henning Kamp struct in_ifaddr *ia; 21709bb5f75SPoul-Henning Kamp int hlen; 218df8bae1dSRodney W. Grimes 219df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 220df8bae1dSRodney W. Grimes if ((m->m_flags & M_PKTHDR) == 0) 22158938916SGarrett Wollman panic("ip_input no HDR"); 222df8bae1dSRodney W. Grimes #endif 223df8bae1dSRodney W. Grimes /* 224df8bae1dSRodney W. Grimes * If no IP addresses have been set yet but the interfaces 225df8bae1dSRodney W. Grimes * are receiving, can't do anything with incoming packets yet. 226df8bae1dSRodney W. Grimes */ 227df8bae1dSRodney W. Grimes if (in_ifaddr == NULL) 228df8bae1dSRodney W. Grimes goto bad; 229df8bae1dSRodney W. Grimes ipstat.ips_total++; 23058938916SGarrett Wollman 23158938916SGarrett Wollman if (m->m_pkthdr.len < sizeof(struct ip)) 23258938916SGarrett Wollman goto tooshort; 23358938916SGarrett Wollman 23458938916SGarrett Wollman #ifdef DIAGNOSTIC 23558938916SGarrett Wollman if (m->m_len < sizeof(struct ip)) 23658938916SGarrett Wollman panic("ipintr mbuf too short"); 23758938916SGarrett Wollman #endif 23858938916SGarrett Wollman 239df8bae1dSRodney W. Grimes if (m->m_len < sizeof (struct ip) && 240df8bae1dSRodney W. Grimes (m = m_pullup(m, sizeof (struct ip))) == 0) { 241df8bae1dSRodney W. Grimes ipstat.ips_toosmall++; 242c67b1d17SGarrett Wollman return; 243df8bae1dSRodney W. Grimes } 244df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 24558938916SGarrett Wollman 24658938916SGarrett Wollman if (IP_VHL_V(ip->ip_vhl) != IPVERSION) { 247df8bae1dSRodney W. Grimes ipstat.ips_badvers++; 248df8bae1dSRodney W. Grimes goto bad; 249df8bae1dSRodney W. Grimes } 25058938916SGarrett Wollman 25158938916SGarrett Wollman hlen = IP_VHL_HL(ip->ip_vhl) << 2; 252df8bae1dSRodney W. Grimes if (hlen < sizeof(struct ip)) { /* minimum header length */ 253df8bae1dSRodney W. Grimes ipstat.ips_badhlen++; 254df8bae1dSRodney W. Grimes goto bad; 255df8bae1dSRodney W. Grimes } 256df8bae1dSRodney W. Grimes if (hlen > m->m_len) { 257df8bae1dSRodney W. Grimes if ((m = m_pullup(m, hlen)) == 0) { 258df8bae1dSRodney W. Grimes ipstat.ips_badhlen++; 259c67b1d17SGarrett Wollman return; 260df8bae1dSRodney W. Grimes } 261df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 262df8bae1dSRodney W. Grimes } 26358938916SGarrett Wollman if (hlen == sizeof(struct ip)) { 26458938916SGarrett Wollman ip->ip_sum = in_cksum_hdr(ip); 26558938916SGarrett Wollman } else { 266623ae52eSPoul-Henning Kamp ip->ip_sum = in_cksum(m, hlen); 26758938916SGarrett Wollman } 268623ae52eSPoul-Henning Kamp if (ip->ip_sum) { 269df8bae1dSRodney W. Grimes ipstat.ips_badsum++; 270df8bae1dSRodney W. Grimes goto bad; 271df8bae1dSRodney W. Grimes } 272df8bae1dSRodney W. Grimes 273df8bae1dSRodney W. Grimes /* 274df8bae1dSRodney W. Grimes * Convert fields to host representation. 275df8bae1dSRodney W. Grimes */ 276df8bae1dSRodney W. Grimes NTOHS(ip->ip_len); 277df8bae1dSRodney W. Grimes if (ip->ip_len < hlen) { 278df8bae1dSRodney W. Grimes ipstat.ips_badlen++; 279df8bae1dSRodney W. Grimes goto bad; 280df8bae1dSRodney W. Grimes } 281df8bae1dSRodney W. Grimes NTOHS(ip->ip_id); 282df8bae1dSRodney W. Grimes NTOHS(ip->ip_off); 283df8bae1dSRodney W. Grimes 284df8bae1dSRodney W. Grimes /* 285df8bae1dSRodney W. Grimes * Check that the amount of data in the buffers 286df8bae1dSRodney W. Grimes * is as at least much as the IP header would have us expect. 287df8bae1dSRodney W. Grimes * Trim mbufs if longer than we expect. 288df8bae1dSRodney W. Grimes * Drop packet if shorter than we expect. 289df8bae1dSRodney W. Grimes */ 290df8bae1dSRodney W. Grimes if (m->m_pkthdr.len < ip->ip_len) { 29158938916SGarrett Wollman tooshort: 292df8bae1dSRodney W. Grimes ipstat.ips_tooshort++; 293df8bae1dSRodney W. Grimes goto bad; 294df8bae1dSRodney W. Grimes } 295df8bae1dSRodney W. Grimes if (m->m_pkthdr.len > ip->ip_len) { 296df8bae1dSRodney W. Grimes if (m->m_len == m->m_pkthdr.len) { 297df8bae1dSRodney W. Grimes m->m_len = ip->ip_len; 298df8bae1dSRodney W. Grimes m->m_pkthdr.len = ip->ip_len; 299df8bae1dSRodney W. Grimes } else 300df8bae1dSRodney W. Grimes m_adj(m, ip->ip_len - m->m_pkthdr.len); 301df8bae1dSRodney W. Grimes } 3024dd1662bSUgen J.S. Antsilevich /* 3034dd1662bSUgen J.S. Antsilevich * IpHack's section. 3044dd1662bSUgen J.S. Antsilevich * Right now when no processing on packet has done 3054dd1662bSUgen J.S. Antsilevich * and it is still fresh out of network we do our black 3064dd1662bSUgen J.S. Antsilevich * deals with it. 30793e0e116SJulian Elischer * - Firewall: deny/allow/divert 308fed1c7e9SSøren Schmidt * - Xlate: translate packet's addr/port (NAT). 3094dd1662bSUgen J.S. Antsilevich * - Wrap: fake packet's addr/port <unimpl.> 3104dd1662bSUgen J.S. Antsilevich * - Encapsulate: put it in another IP and send out. <unimp.> 3114dd1662bSUgen J.S. Antsilevich */ 312df8bae1dSRodney W. Grimes 31358938916SGarrett Wollman #ifdef COMPAT_IPFW 31493e0e116SJulian Elischer if (ip_fw_chk_ptr) { 31593e0e116SJulian Elischer int action; 31693e0e116SJulian Elischer 31793e0e116SJulian Elischer #ifdef IPDIVERT 31893e0e116SJulian Elischer action = (*ip_fw_chk_ptr)(&ip, hlen, 31993e0e116SJulian Elischer m->m_pkthdr.rcvif, ip_divert_ignore, &m); 32093e0e116SJulian Elischer #else 32193e0e116SJulian Elischer action = (*ip_fw_chk_ptr)(&ip, hlen, m->m_pkthdr.rcvif, 0, &m); 32293e0e116SJulian Elischer #endif 32393e0e116SJulian Elischer if (action == -1) 324539e53baSPoul-Henning Kamp return; 32593e0e116SJulian Elischer if (action != 0) { 32693e0e116SJulian Elischer #ifdef IPDIVERT 32793e0e116SJulian Elischer frag_divert_port = action; 32893e0e116SJulian Elischer goto ours; 32993e0e116SJulian Elischer #else 33093e0e116SJulian Elischer goto bad; /* ipfw said divert but we can't */ 33193e0e116SJulian Elischer #endif 33293e0e116SJulian Elischer } 33393e0e116SJulian Elischer } 334100ba1a6SJordan K. Hubbard 3356713d4a7SSøren Schmidt if (ip_nat_ptr && !(*ip_nat_ptr)(&ip, &m, m->m_pkthdr.rcvif, IP_NAT_IN)) 336fed1c7e9SSøren Schmidt return; 33758938916SGarrett Wollman #endif 338fed1c7e9SSøren Schmidt 339df8bae1dSRodney W. Grimes /* 340df8bae1dSRodney W. Grimes * Process options and, if not destined for us, 341df8bae1dSRodney W. Grimes * ship it on. ip_dooptions returns 1 when an 342df8bae1dSRodney W. Grimes * error was detected (causing an icmp message 343df8bae1dSRodney W. Grimes * to be sent and the original packet to be freed). 344df8bae1dSRodney W. Grimes */ 345df8bae1dSRodney W. Grimes ip_nhops = 0; /* for source routed packets */ 346df8bae1dSRodney W. Grimes if (hlen > sizeof (struct ip) && ip_dooptions(m)) 347c67b1d17SGarrett Wollman return; 348df8bae1dSRodney W. Grimes 349f0068c4aSGarrett Wollman /* greedy RSVP, snatches any PATH packet of the RSVP protocol and no 350f0068c4aSGarrett Wollman * matter if it is destined to another node, or whether it is 351f0068c4aSGarrett Wollman * a multicast one, RSVP wants it! and prevents it from being forwarded 352f0068c4aSGarrett Wollman * anywhere else. Also checks if the rsvp daemon is running before 353f0068c4aSGarrett Wollman * grabbing the packet. 354f0068c4aSGarrett Wollman */ 3551c5de19aSGarrett Wollman if (rsvp_on && ip->ip_p==IPPROTO_RSVP) 356f0068c4aSGarrett Wollman goto ours; 357f0068c4aSGarrett Wollman 358df8bae1dSRodney W. Grimes /* 359df8bae1dSRodney W. Grimes * Check our list of addresses, to see if the packet is for us. 360df8bae1dSRodney W. Grimes */ 361df8bae1dSRodney W. Grimes for (ia = in_ifaddr; ia; ia = ia->ia_next) { 362df8bae1dSRodney W. Grimes #define satosin(sa) ((struct sockaddr_in *)(sa)) 363df8bae1dSRodney W. Grimes 364df8bae1dSRodney W. Grimes if (IA_SIN(ia)->sin_addr.s_addr == ip->ip_dst.s_addr) 365df8bae1dSRodney W. Grimes goto ours; 3666ed666afSPoul-Henning Kamp if (ia->ia_ifp && ia->ia_ifp->if_flags & IFF_BROADCAST) { 367df8bae1dSRodney W. Grimes if (satosin(&ia->ia_broadaddr)->sin_addr.s_addr == 368df8bae1dSRodney W. Grimes ip->ip_dst.s_addr) 369df8bae1dSRodney W. Grimes goto ours; 370df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == ia->ia_netbroadcast.s_addr) 371df8bae1dSRodney W. Grimes goto ours; 372df8bae1dSRodney W. Grimes } 373df8bae1dSRodney W. Grimes } 374df8bae1dSRodney W. Grimes if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr))) { 375df8bae1dSRodney W. Grimes struct in_multi *inm; 376df8bae1dSRodney W. Grimes if (ip_mrouter) { 377df8bae1dSRodney W. Grimes /* 378df8bae1dSRodney W. Grimes * If we are acting as a multicast router, all 379df8bae1dSRodney W. Grimes * incoming multicast packets are passed to the 380df8bae1dSRodney W. Grimes * kernel-level multicast forwarding function. 381df8bae1dSRodney W. Grimes * The packet is returned (relatively) intact; if 382df8bae1dSRodney W. Grimes * ip_mforward() returns a non-zero value, the packet 383df8bae1dSRodney W. Grimes * must be discarded, else it may be accepted below. 384df8bae1dSRodney W. Grimes * 385df8bae1dSRodney W. Grimes * (The IP ident field is put in the same byte order 386df8bae1dSRodney W. Grimes * as expected when ip_mforward() is called from 387df8bae1dSRodney W. Grimes * ip_output().) 388df8bae1dSRodney W. Grimes */ 389df8bae1dSRodney W. Grimes ip->ip_id = htons(ip->ip_id); 390f0068c4aSGarrett Wollman if (ip_mforward(ip, m->m_pkthdr.rcvif, m, 0) != 0) { 391df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 392df8bae1dSRodney W. Grimes m_freem(m); 393c67b1d17SGarrett Wollman return; 394df8bae1dSRodney W. Grimes } 395df8bae1dSRodney W. Grimes ip->ip_id = ntohs(ip->ip_id); 396df8bae1dSRodney W. Grimes 397df8bae1dSRodney W. Grimes /* 398df8bae1dSRodney W. Grimes * The process-level routing demon needs to receive 399df8bae1dSRodney W. Grimes * all multicast IGMP packets, whether or not this 400df8bae1dSRodney W. Grimes * host belongs to their destination groups. 401df8bae1dSRodney W. Grimes */ 402df8bae1dSRodney W. Grimes if (ip->ip_p == IPPROTO_IGMP) 403df8bae1dSRodney W. Grimes goto ours; 404df8bae1dSRodney W. Grimes ipstat.ips_forward++; 405df8bae1dSRodney W. Grimes } 406df8bae1dSRodney W. Grimes /* 407df8bae1dSRodney W. Grimes * See if we belong to the destination multicast group on the 408df8bae1dSRodney W. Grimes * arrival interface. 409df8bae1dSRodney W. Grimes */ 410df8bae1dSRodney W. Grimes IN_LOOKUP_MULTI(ip->ip_dst, m->m_pkthdr.rcvif, inm); 411df8bae1dSRodney W. Grimes if (inm == NULL) { 412df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 413df8bae1dSRodney W. Grimes m_freem(m); 414c67b1d17SGarrett Wollman return; 415df8bae1dSRodney W. Grimes } 416df8bae1dSRodney W. Grimes goto ours; 417df8bae1dSRodney W. Grimes } 418df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == (u_long)INADDR_BROADCAST) 419df8bae1dSRodney W. Grimes goto ours; 420df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == INADDR_ANY) 421df8bae1dSRodney W. Grimes goto ours; 422df8bae1dSRodney W. Grimes 423df8bae1dSRodney W. Grimes /* 424df8bae1dSRodney W. Grimes * Not for us; forward if possible and desirable. 425df8bae1dSRodney W. Grimes */ 426df8bae1dSRodney W. Grimes if (ipforwarding == 0) { 427df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 428df8bae1dSRodney W. Grimes m_freem(m); 429df8bae1dSRodney W. Grimes } else 430df8bae1dSRodney W. Grimes ip_forward(m, 0); 431c67b1d17SGarrett Wollman return; 432df8bae1dSRodney W. Grimes 433df8bae1dSRodney W. Grimes ours: 434100ba1a6SJordan K. Hubbard 43563f8d699SJordan K. Hubbard /* 436df8bae1dSRodney W. Grimes * If offset or IP_MF are set, must reassemble. 437df8bae1dSRodney W. Grimes * Otherwise, nothing need be done. 438df8bae1dSRodney W. Grimes * (We could look in the reassembly queue to see 439df8bae1dSRodney W. Grimes * if the packet was previously fragmented, 440df8bae1dSRodney W. Grimes * but it's not worth the time; just let them time out.) 441df8bae1dSRodney W. Grimes */ 442df8bae1dSRodney W. Grimes if (ip->ip_off &~ IP_DF) { 443df8bae1dSRodney W. Grimes if (m->m_flags & M_EXT) { /* XXX */ 444df8bae1dSRodney W. Grimes if ((m = m_pullup(m, sizeof (struct ip))) == 0) { 445df8bae1dSRodney W. Grimes ipstat.ips_toosmall++; 44693e0e116SJulian Elischer #ifdef IPDIVERT 44793e0e116SJulian Elischer frag_divert_port = 0; 44893e0e116SJulian Elischer #endif 449c67b1d17SGarrett Wollman return; 450df8bae1dSRodney W. Grimes } 451df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 452df8bae1dSRodney W. Grimes } 453df8bae1dSRodney W. Grimes /* 454df8bae1dSRodney W. Grimes * Look for queue of fragments 455df8bae1dSRodney W. Grimes * of this datagram. 456df8bae1dSRodney W. Grimes */ 457df8bae1dSRodney W. Grimes for (fp = ipq.next; fp != &ipq; fp = fp->next) 458df8bae1dSRodney W. Grimes if (ip->ip_id == fp->ipq_id && 459df8bae1dSRodney W. Grimes ip->ip_src.s_addr == fp->ipq_src.s_addr && 460df8bae1dSRodney W. Grimes ip->ip_dst.s_addr == fp->ipq_dst.s_addr && 461df8bae1dSRodney W. Grimes ip->ip_p == fp->ipq_p) 462df8bae1dSRodney W. Grimes goto found; 463df8bae1dSRodney W. Grimes fp = 0; 464df8bae1dSRodney W. Grimes found: 465df8bae1dSRodney W. Grimes 466df8bae1dSRodney W. Grimes /* 467df8bae1dSRodney W. Grimes * Adjust ip_len to not reflect header, 468df8bae1dSRodney W. Grimes * set ip_mff if more fragments are expected, 469df8bae1dSRodney W. Grimes * convert offset of this to bytes. 470df8bae1dSRodney W. Grimes */ 471df8bae1dSRodney W. Grimes ip->ip_len -= hlen; 472df8bae1dSRodney W. Grimes ((struct ipasfrag *)ip)->ipf_mff &= ~1; 473df8bae1dSRodney W. Grimes if (ip->ip_off & IP_MF) 474df8bae1dSRodney W. Grimes ((struct ipasfrag *)ip)->ipf_mff |= 1; 475df8bae1dSRodney W. Grimes ip->ip_off <<= 3; 476df8bae1dSRodney W. Grimes 477df8bae1dSRodney W. Grimes /* 478df8bae1dSRodney W. Grimes * If datagram marked as having more fragments 479df8bae1dSRodney W. Grimes * or if this is not the first fragment, 480df8bae1dSRodney W. Grimes * attempt reassembly; if it succeeds, proceed. 481df8bae1dSRodney W. Grimes */ 482df8bae1dSRodney W. Grimes if (((struct ipasfrag *)ip)->ipf_mff & 1 || ip->ip_off) { 483df8bae1dSRodney W. Grimes ipstat.ips_fragments++; 484df8bae1dSRodney W. Grimes ip = ip_reass((struct ipasfrag *)ip, fp); 485df8bae1dSRodney W. Grimes if (ip == 0) 486c67b1d17SGarrett Wollman return; 487df8bae1dSRodney W. Grimes ipstat.ips_reassembled++; 488df8bae1dSRodney W. Grimes m = dtom(ip); 489df8bae1dSRodney W. Grimes } else 490df8bae1dSRodney W. Grimes if (fp) 491df8bae1dSRodney W. Grimes ip_freef(fp); 492df8bae1dSRodney W. Grimes } else 493df8bae1dSRodney W. Grimes ip->ip_len -= hlen; 494df8bae1dSRodney W. Grimes 49593e0e116SJulian Elischer #ifdef IPDIVERT 49693e0e116SJulian Elischer /* 49793e0e116SJulian Elischer * Divert packets here to the divert protocol if required 49893e0e116SJulian Elischer */ 49993e0e116SJulian Elischer if (frag_divert_port) { 50093e0e116SJulian Elischer ip_divert_port = frag_divert_port; 50193e0e116SJulian Elischer frag_divert_port = 0; 50293e0e116SJulian Elischer (*inetsw[ip_protox[IPPROTO_DIVERT]].pr_input)(m, hlen); 50393e0e116SJulian Elischer return; 50493e0e116SJulian Elischer } 50593e0e116SJulian Elischer #endif 50693e0e116SJulian Elischer 507df8bae1dSRodney W. Grimes /* 508df8bae1dSRodney W. Grimes * Switch out to protocol's input routine. 509df8bae1dSRodney W. Grimes */ 510df8bae1dSRodney W. Grimes ipstat.ips_delivered++; 511df8bae1dSRodney W. Grimes (*inetsw[ip_protox[ip->ip_p]].pr_input)(m, hlen); 512c67b1d17SGarrett Wollman return; 513df8bae1dSRodney W. Grimes bad: 514df8bae1dSRodney W. Grimes m_freem(m); 515c67b1d17SGarrett Wollman } 516c67b1d17SGarrett Wollman 517c67b1d17SGarrett Wollman /* 518c67b1d17SGarrett Wollman * IP software interrupt routine - to go away sometime soon 519c67b1d17SGarrett Wollman */ 520c67b1d17SGarrett Wollman static void 521c67b1d17SGarrett Wollman ipintr(void) 522c67b1d17SGarrett Wollman { 523c67b1d17SGarrett Wollman int s; 524c67b1d17SGarrett Wollman struct mbuf *m; 525c67b1d17SGarrett Wollman 526c67b1d17SGarrett Wollman while(1) { 527c67b1d17SGarrett Wollman s = splimp(); 528c67b1d17SGarrett Wollman IF_DEQUEUE(&ipintrq, m); 529c67b1d17SGarrett Wollman splx(s); 530c67b1d17SGarrett Wollman if (m == 0) 531c67b1d17SGarrett Wollman return; 532c67b1d17SGarrett Wollman ip_input(m); 533c67b1d17SGarrett Wollman } 534df8bae1dSRodney W. Grimes } 535df8bae1dSRodney W. Grimes 536748e0b0aSGarrett Wollman NETISR_SET(NETISR_IP, ipintr); 537748e0b0aSGarrett Wollman 538df8bae1dSRodney W. Grimes /* 539df8bae1dSRodney W. Grimes * Take incoming datagram fragment and try to 540df8bae1dSRodney W. Grimes * reassemble it into whole datagram. If a chain for 541df8bae1dSRodney W. Grimes * reassembly of this datagram already exists, then it 542df8bae1dSRodney W. Grimes * is given as fp; otherwise have to make a chain. 543df8bae1dSRodney W. Grimes */ 5440312fbe9SPoul-Henning Kamp static struct ip * 545df8bae1dSRodney W. Grimes ip_reass(ip, fp) 546df8bae1dSRodney W. Grimes register struct ipasfrag *ip; 547df8bae1dSRodney W. Grimes register struct ipq *fp; 548df8bae1dSRodney W. Grimes { 549df8bae1dSRodney W. Grimes register struct mbuf *m = dtom(ip); 550df8bae1dSRodney W. Grimes register struct ipasfrag *q; 551df8bae1dSRodney W. Grimes struct mbuf *t; 552df8bae1dSRodney W. Grimes int hlen = ip->ip_hl << 2; 553df8bae1dSRodney W. Grimes int i, next; 554df8bae1dSRodney W. Grimes 555df8bae1dSRodney W. Grimes /* 556df8bae1dSRodney W. Grimes * Presence of header sizes in mbufs 557df8bae1dSRodney W. Grimes * would confuse code below. 558df8bae1dSRodney W. Grimes */ 559df8bae1dSRodney W. Grimes m->m_data += hlen; 560df8bae1dSRodney W. Grimes m->m_len -= hlen; 561df8bae1dSRodney W. Grimes 562df8bae1dSRodney W. Grimes /* 563df8bae1dSRodney W. Grimes * If first fragment to arrive, create a reassembly queue. 564df8bae1dSRodney W. Grimes */ 565df8bae1dSRodney W. Grimes if (fp == 0) { 566df8bae1dSRodney W. Grimes if ((t = m_get(M_DONTWAIT, MT_FTABLE)) == NULL) 567df8bae1dSRodney W. Grimes goto dropfrag; 568df8bae1dSRodney W. Grimes fp = mtod(t, struct ipq *); 569df8bae1dSRodney W. Grimes insque(fp, &ipq); 570df8bae1dSRodney W. Grimes fp->ipq_ttl = IPFRAGTTL; 571df8bae1dSRodney W. Grimes fp->ipq_p = ip->ip_p; 572df8bae1dSRodney W. Grimes fp->ipq_id = ip->ip_id; 573df8bae1dSRodney W. Grimes fp->ipq_next = fp->ipq_prev = (struct ipasfrag *)fp; 574df8bae1dSRodney W. Grimes fp->ipq_src = ((struct ip *)ip)->ip_src; 575df8bae1dSRodney W. Grimes fp->ipq_dst = ((struct ip *)ip)->ip_dst; 57693e0e116SJulian Elischer #ifdef IPDIVERT 57793e0e116SJulian Elischer fp->ipq_divert = 0; 57893e0e116SJulian Elischer #endif 579df8bae1dSRodney W. Grimes q = (struct ipasfrag *)fp; 580df8bae1dSRodney W. Grimes goto insert; 581df8bae1dSRodney W. Grimes } 582df8bae1dSRodney W. Grimes 583df8bae1dSRodney W. Grimes /* 584df8bae1dSRodney W. Grimes * Find a segment which begins after this one does. 585df8bae1dSRodney W. Grimes */ 586df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next) 587df8bae1dSRodney W. Grimes if (q->ip_off > ip->ip_off) 588df8bae1dSRodney W. Grimes break; 589df8bae1dSRodney W. Grimes 590df8bae1dSRodney W. Grimes /* 591df8bae1dSRodney W. Grimes * If there is a preceding segment, it may provide some of 592df8bae1dSRodney W. Grimes * our data already. If so, drop the data from the incoming 593df8bae1dSRodney W. Grimes * segment. If it provides all of our data, drop us. 594df8bae1dSRodney W. Grimes */ 595df8bae1dSRodney W. Grimes if (q->ipf_prev != (struct ipasfrag *)fp) { 596df8bae1dSRodney W. Grimes i = q->ipf_prev->ip_off + q->ipf_prev->ip_len - ip->ip_off; 597df8bae1dSRodney W. Grimes if (i > 0) { 598df8bae1dSRodney W. Grimes if (i >= ip->ip_len) 599df8bae1dSRodney W. Grimes goto dropfrag; 600df8bae1dSRodney W. Grimes m_adj(dtom(ip), i); 601df8bae1dSRodney W. Grimes ip->ip_off += i; 602df8bae1dSRodney W. Grimes ip->ip_len -= i; 603df8bae1dSRodney W. Grimes } 604df8bae1dSRodney W. Grimes } 605df8bae1dSRodney W. Grimes 606df8bae1dSRodney W. Grimes /* 607df8bae1dSRodney W. Grimes * While we overlap succeeding segments trim them or, 608df8bae1dSRodney W. Grimes * if they are completely covered, dequeue them. 609df8bae1dSRodney W. Grimes */ 610df8bae1dSRodney W. Grimes while (q != (struct ipasfrag *)fp && ip->ip_off + ip->ip_len > q->ip_off) { 611e7c81944SDavid Greenman struct mbuf *m0; 612e7c81944SDavid Greenman 613df8bae1dSRodney W. Grimes i = (ip->ip_off + ip->ip_len) - q->ip_off; 614df8bae1dSRodney W. Grimes if (i < q->ip_len) { 615df8bae1dSRodney W. Grimes q->ip_len -= i; 616df8bae1dSRodney W. Grimes q->ip_off += i; 617df8bae1dSRodney W. Grimes m_adj(dtom(q), i); 618df8bae1dSRodney W. Grimes break; 619df8bae1dSRodney W. Grimes } 620e7c81944SDavid Greenman m0 = dtom(q); 621df8bae1dSRodney W. Grimes q = q->ipf_next; 622df8bae1dSRodney W. Grimes ip_deq(q->ipf_prev); 623e7c81944SDavid Greenman m_freem(m0); 624df8bae1dSRodney W. Grimes } 625df8bae1dSRodney W. Grimes 626df8bae1dSRodney W. Grimes insert: 62793e0e116SJulian Elischer 62893e0e116SJulian Elischer #ifdef IPDIVERT 62993e0e116SJulian Elischer /* 63093e0e116SJulian Elischer * Any fragment diverting causes the whole packet to divert 63193e0e116SJulian Elischer */ 63293e0e116SJulian Elischer if (frag_divert_port != 0) 63393e0e116SJulian Elischer fp->ipq_divert = frag_divert_port; 63493e0e116SJulian Elischer frag_divert_port = 0; 63593e0e116SJulian Elischer #endif 63693e0e116SJulian Elischer 637df8bae1dSRodney W. Grimes /* 638df8bae1dSRodney W. Grimes * Stick new segment in its place; 639df8bae1dSRodney W. Grimes * check for complete reassembly. 640df8bae1dSRodney W. Grimes */ 641df8bae1dSRodney W. Grimes ip_enq(ip, q->ipf_prev); 642df8bae1dSRodney W. Grimes next = 0; 643df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next) { 644df8bae1dSRodney W. Grimes if (q->ip_off != next) 645df8bae1dSRodney W. Grimes return (0); 646df8bae1dSRodney W. Grimes next += q->ip_len; 647df8bae1dSRodney W. Grimes } 648df8bae1dSRodney W. Grimes if (q->ipf_prev->ipf_mff & 1) 649df8bae1dSRodney W. Grimes return (0); 650df8bae1dSRodney W. Grimes 651df8bae1dSRodney W. Grimes /* 652430d30d8SBill Fenner * Reassembly is complete. Make sure the packet is a sane size. 653430d30d8SBill Fenner */ 654430d30d8SBill Fenner if (next + (IP_VHL_HL(((struct ip *)fp->ipq_next)->ip_vhl) << 2) 655430d30d8SBill Fenner > IP_MAXPACKET) { 656430d30d8SBill Fenner ipstat.ips_toolong++; 657430d30d8SBill Fenner ip_freef(fp); 658430d30d8SBill Fenner return (0); 659430d30d8SBill Fenner } 660430d30d8SBill Fenner 661430d30d8SBill Fenner /* 662430d30d8SBill Fenner * Concatenate fragments. 663df8bae1dSRodney W. Grimes */ 664df8bae1dSRodney W. Grimes q = fp->ipq_next; 665df8bae1dSRodney W. Grimes m = dtom(q); 666df8bae1dSRodney W. Grimes t = m->m_next; 667df8bae1dSRodney W. Grimes m->m_next = 0; 668df8bae1dSRodney W. Grimes m_cat(m, t); 669df8bae1dSRodney W. Grimes q = q->ipf_next; 670df8bae1dSRodney W. Grimes while (q != (struct ipasfrag *)fp) { 671df8bae1dSRodney W. Grimes t = dtom(q); 672df8bae1dSRodney W. Grimes q = q->ipf_next; 673df8bae1dSRodney W. Grimes m_cat(m, t); 674df8bae1dSRodney W. Grimes } 675df8bae1dSRodney W. Grimes 67693e0e116SJulian Elischer #ifdef IPDIVERT 67793e0e116SJulian Elischer /* 67893e0e116SJulian Elischer * Record divert port for packet, if any 67993e0e116SJulian Elischer */ 68093e0e116SJulian Elischer frag_divert_port = fp->ipq_divert; 68193e0e116SJulian Elischer #endif 68293e0e116SJulian Elischer 683df8bae1dSRodney W. Grimes /* 684df8bae1dSRodney W. Grimes * Create header for new ip packet by 685df8bae1dSRodney W. Grimes * modifying header of first packet; 686df8bae1dSRodney W. Grimes * dequeue and discard fragment reassembly header. 687df8bae1dSRodney W. Grimes * Make header visible. 688df8bae1dSRodney W. Grimes */ 689df8bae1dSRodney W. Grimes ip = fp->ipq_next; 690df8bae1dSRodney W. Grimes ip->ip_len = next; 691df8bae1dSRodney W. Grimes ip->ipf_mff &= ~1; 692df8bae1dSRodney W. Grimes ((struct ip *)ip)->ip_src = fp->ipq_src; 693df8bae1dSRodney W. Grimes ((struct ip *)ip)->ip_dst = fp->ipq_dst; 694df8bae1dSRodney W. Grimes remque(fp); 695df8bae1dSRodney W. Grimes (void) m_free(dtom(fp)); 696df8bae1dSRodney W. Grimes m = dtom(ip); 697df8bae1dSRodney W. Grimes m->m_len += (ip->ip_hl << 2); 698df8bae1dSRodney W. Grimes m->m_data -= (ip->ip_hl << 2); 699df8bae1dSRodney W. Grimes /* some debugging cruft by sklower, below, will go away soon */ 700df8bae1dSRodney W. Grimes if (m->m_flags & M_PKTHDR) { /* XXX this should be done elsewhere */ 701df8bae1dSRodney W. Grimes register int plen = 0; 702df8bae1dSRodney W. Grimes for (t = m; m; m = m->m_next) 703df8bae1dSRodney W. Grimes plen += m->m_len; 704df8bae1dSRodney W. Grimes t->m_pkthdr.len = plen; 705df8bae1dSRodney W. Grimes } 706df8bae1dSRodney W. Grimes return ((struct ip *)ip); 707df8bae1dSRodney W. Grimes 708df8bae1dSRodney W. Grimes dropfrag: 709df8bae1dSRodney W. Grimes ipstat.ips_fragdropped++; 710df8bae1dSRodney W. Grimes m_freem(m); 711df8bae1dSRodney W. Grimes return (0); 712df8bae1dSRodney W. Grimes } 713df8bae1dSRodney W. Grimes 714df8bae1dSRodney W. Grimes /* 715df8bae1dSRodney W. Grimes * Free a fragment reassembly header and all 716df8bae1dSRodney W. Grimes * associated datagrams. 717df8bae1dSRodney W. Grimes */ 7180312fbe9SPoul-Henning Kamp static void 719df8bae1dSRodney W. Grimes ip_freef(fp) 720df8bae1dSRodney W. Grimes struct ipq *fp; 721df8bae1dSRodney W. Grimes { 722df8bae1dSRodney W. Grimes register struct ipasfrag *q, *p; 723df8bae1dSRodney W. Grimes 724df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = p) { 725df8bae1dSRodney W. Grimes p = q->ipf_next; 726df8bae1dSRodney W. Grimes ip_deq(q); 727df8bae1dSRodney W. Grimes m_freem(dtom(q)); 728df8bae1dSRodney W. Grimes } 729df8bae1dSRodney W. Grimes remque(fp); 730df8bae1dSRodney W. Grimes (void) m_free(dtom(fp)); 731df8bae1dSRodney W. Grimes } 732df8bae1dSRodney W. Grimes 733df8bae1dSRodney W. Grimes /* 734df8bae1dSRodney W. Grimes * Put an ip fragment on a reassembly chain. 735df8bae1dSRodney W. Grimes * Like insque, but pointers in middle of structure. 736df8bae1dSRodney W. Grimes */ 7370312fbe9SPoul-Henning Kamp static void 738df8bae1dSRodney W. Grimes ip_enq(p, prev) 739df8bae1dSRodney W. Grimes register struct ipasfrag *p, *prev; 740df8bae1dSRodney W. Grimes { 741df8bae1dSRodney W. Grimes 742df8bae1dSRodney W. Grimes p->ipf_prev = prev; 743df8bae1dSRodney W. Grimes p->ipf_next = prev->ipf_next; 744df8bae1dSRodney W. Grimes prev->ipf_next->ipf_prev = p; 745df8bae1dSRodney W. Grimes prev->ipf_next = p; 746df8bae1dSRodney W. Grimes } 747df8bae1dSRodney W. Grimes 748df8bae1dSRodney W. Grimes /* 749df8bae1dSRodney W. Grimes * To ip_enq as remque is to insque. 750df8bae1dSRodney W. Grimes */ 7510312fbe9SPoul-Henning Kamp static void 752df8bae1dSRodney W. Grimes ip_deq(p) 753df8bae1dSRodney W. Grimes register struct ipasfrag *p; 754df8bae1dSRodney W. Grimes { 755df8bae1dSRodney W. Grimes 756df8bae1dSRodney W. Grimes p->ipf_prev->ipf_next = p->ipf_next; 757df8bae1dSRodney W. Grimes p->ipf_next->ipf_prev = p->ipf_prev; 758df8bae1dSRodney W. Grimes } 759df8bae1dSRodney W. Grimes 760df8bae1dSRodney W. Grimes /* 761df8bae1dSRodney W. Grimes * IP timer processing; 762df8bae1dSRodney W. Grimes * if a timer expires on a reassembly 763df8bae1dSRodney W. Grimes * queue, discard it. 764df8bae1dSRodney W. Grimes */ 765df8bae1dSRodney W. Grimes void 766df8bae1dSRodney W. Grimes ip_slowtimo() 767df8bae1dSRodney W. Grimes { 768df8bae1dSRodney W. Grimes register struct ipq *fp; 769df8bae1dSRodney W. Grimes int s = splnet(); 770df8bae1dSRodney W. Grimes 771df8bae1dSRodney W. Grimes fp = ipq.next; 772df8bae1dSRodney W. Grimes if (fp == 0) { 773df8bae1dSRodney W. Grimes splx(s); 774df8bae1dSRodney W. Grimes return; 775df8bae1dSRodney W. Grimes } 776df8bae1dSRodney W. Grimes while (fp != &ipq) { 777df8bae1dSRodney W. Grimes --fp->ipq_ttl; 778df8bae1dSRodney W. Grimes fp = fp->next; 779df8bae1dSRodney W. Grimes if (fp->prev->ipq_ttl == 0) { 780df8bae1dSRodney W. Grimes ipstat.ips_fragtimeout++; 781df8bae1dSRodney W. Grimes ip_freef(fp->prev); 782df8bae1dSRodney W. Grimes } 783df8bae1dSRodney W. Grimes } 784df8bae1dSRodney W. Grimes splx(s); 785df8bae1dSRodney W. Grimes } 786df8bae1dSRodney W. Grimes 787df8bae1dSRodney W. Grimes /* 788df8bae1dSRodney W. Grimes * Drain off all datagram fragments. 789df8bae1dSRodney W. Grimes */ 790df8bae1dSRodney W. Grimes void 791df8bae1dSRodney W. Grimes ip_drain() 792df8bae1dSRodney W. Grimes { 793df8bae1dSRodney W. Grimes while (ipq.next != &ipq) { 794df8bae1dSRodney W. Grimes ipstat.ips_fragdropped++; 795df8bae1dSRodney W. Grimes ip_freef(ipq.next); 796df8bae1dSRodney W. Grimes } 797ce29ab3aSGarrett Wollman 798ce29ab3aSGarrett Wollman in_rtqdrain(); 799df8bae1dSRodney W. Grimes } 800df8bae1dSRodney W. Grimes 801df8bae1dSRodney W. Grimes /* 802df8bae1dSRodney W. Grimes * Do option processing on a datagram, 803df8bae1dSRodney W. Grimes * possibly discarding it if bad options are encountered, 804df8bae1dSRodney W. Grimes * or forwarding it if source-routed. 805df8bae1dSRodney W. Grimes * Returns 1 if packet has been forwarded/freed, 806df8bae1dSRodney W. Grimes * 0 if the packet should be processed further. 807df8bae1dSRodney W. Grimes */ 8080312fbe9SPoul-Henning Kamp static int 809df8bae1dSRodney W. Grimes ip_dooptions(m) 810df8bae1dSRodney W. Grimes struct mbuf *m; 811df8bae1dSRodney W. Grimes { 812df8bae1dSRodney W. Grimes register struct ip *ip = mtod(m, struct ip *); 813df8bae1dSRodney W. Grimes register u_char *cp; 814df8bae1dSRodney W. Grimes register struct ip_timestamp *ipt; 815df8bae1dSRodney W. Grimes register struct in_ifaddr *ia; 816df8bae1dSRodney W. Grimes int opt, optlen, cnt, off, code, type = ICMP_PARAMPROB, forward = 0; 817df8bae1dSRodney W. Grimes struct in_addr *sin, dst; 818df8bae1dSRodney W. Grimes n_time ntime; 819df8bae1dSRodney W. Grimes 820df8bae1dSRodney W. Grimes dst = ip->ip_dst; 821df8bae1dSRodney W. Grimes cp = (u_char *)(ip + 1); 82258938916SGarrett Wollman cnt = (IP_VHL_HL(ip->ip_vhl) << 2) - sizeof (struct ip); 823df8bae1dSRodney W. Grimes for (; cnt > 0; cnt -= optlen, cp += optlen) { 824df8bae1dSRodney W. Grimes opt = cp[IPOPT_OPTVAL]; 825df8bae1dSRodney W. Grimes if (opt == IPOPT_EOL) 826df8bae1dSRodney W. Grimes break; 827df8bae1dSRodney W. Grimes if (opt == IPOPT_NOP) 828df8bae1dSRodney W. Grimes optlen = 1; 829df8bae1dSRodney W. Grimes else { 830df8bae1dSRodney W. Grimes optlen = cp[IPOPT_OLEN]; 831df8bae1dSRodney W. Grimes if (optlen <= 0 || optlen > cnt) { 832df8bae1dSRodney W. Grimes code = &cp[IPOPT_OLEN] - (u_char *)ip; 833df8bae1dSRodney W. Grimes goto bad; 834df8bae1dSRodney W. Grimes } 835df8bae1dSRodney W. Grimes } 836df8bae1dSRodney W. Grimes switch (opt) { 837df8bae1dSRodney W. Grimes 838df8bae1dSRodney W. Grimes default: 839df8bae1dSRodney W. Grimes break; 840df8bae1dSRodney W. Grimes 841df8bae1dSRodney W. Grimes /* 842df8bae1dSRodney W. Grimes * Source routing with record. 843df8bae1dSRodney W. Grimes * Find interface with current destination address. 844df8bae1dSRodney W. Grimes * If none on this machine then drop if strictly routed, 845df8bae1dSRodney W. Grimes * or do nothing if loosely routed. 846df8bae1dSRodney W. Grimes * Record interface address and bring up next address 847df8bae1dSRodney W. Grimes * component. If strictly routed make sure next 848df8bae1dSRodney W. Grimes * address is on directly accessible net. 849df8bae1dSRodney W. Grimes */ 850df8bae1dSRodney W. Grimes case IPOPT_LSRR: 851df8bae1dSRodney W. Grimes case IPOPT_SSRR: 852df8bae1dSRodney W. Grimes if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) { 853df8bae1dSRodney W. Grimes code = &cp[IPOPT_OFFSET] - (u_char *)ip; 854df8bae1dSRodney W. Grimes goto bad; 855df8bae1dSRodney W. Grimes } 856df8bae1dSRodney W. Grimes ipaddr.sin_addr = ip->ip_dst; 857df8bae1dSRodney W. Grimes ia = (struct in_ifaddr *) 858df8bae1dSRodney W. Grimes ifa_ifwithaddr((struct sockaddr *)&ipaddr); 859df8bae1dSRodney W. Grimes if (ia == 0) { 860df8bae1dSRodney W. Grimes if (opt == IPOPT_SSRR) { 861df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 862df8bae1dSRodney W. Grimes code = ICMP_UNREACH_SRCFAIL; 863df8bae1dSRodney W. Grimes goto bad; 864df8bae1dSRodney W. Grimes } 865df8bae1dSRodney W. Grimes /* 866df8bae1dSRodney W. Grimes * Loose routing, and not at next destination 867df8bae1dSRodney W. Grimes * yet; nothing to do except forward. 868df8bae1dSRodney W. Grimes */ 869df8bae1dSRodney W. Grimes break; 870df8bae1dSRodney W. Grimes } 871df8bae1dSRodney W. Grimes off--; /* 0 origin */ 872df8bae1dSRodney W. Grimes if (off > optlen - sizeof(struct in_addr)) { 873df8bae1dSRodney W. Grimes /* 874df8bae1dSRodney W. Grimes * End of source route. Should be for us. 875df8bae1dSRodney W. Grimes */ 876df8bae1dSRodney W. Grimes save_rte(cp, ip->ip_src); 877df8bae1dSRodney W. Grimes break; 878df8bae1dSRodney W. Grimes } 8791025071fSGarrett Wollman 8801025071fSGarrett Wollman if (!ip_dosourceroute) { 8811025071fSGarrett Wollman char buf[4*sizeof "123"]; 8821025071fSGarrett Wollman strcpy(buf, inet_ntoa(ip->ip_dst)); 8831025071fSGarrett Wollman 8841025071fSGarrett Wollman log(LOG_WARNING, 8851025071fSGarrett Wollman "attempted source route from %s to %s\n", 8861025071fSGarrett Wollman inet_ntoa(ip->ip_src), buf); 8871025071fSGarrett Wollman type = ICMP_UNREACH; 8881025071fSGarrett Wollman code = ICMP_UNREACH_SRCFAIL; 8891025071fSGarrett Wollman goto bad; 8901025071fSGarrett Wollman } 8911025071fSGarrett Wollman 892df8bae1dSRodney W. Grimes /* 893df8bae1dSRodney W. Grimes * locate outgoing interface 894df8bae1dSRodney W. Grimes */ 89594a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, cp + off, 896df8bae1dSRodney W. Grimes sizeof(ipaddr.sin_addr)); 8971025071fSGarrett Wollman 898df8bae1dSRodney W. Grimes if (opt == IPOPT_SSRR) { 899df8bae1dSRodney W. Grimes #define INA struct in_ifaddr * 900df8bae1dSRodney W. Grimes #define SA struct sockaddr * 901df8bae1dSRodney W. Grimes if ((ia = (INA)ifa_ifwithdstaddr((SA)&ipaddr)) == 0) 902df8bae1dSRodney W. Grimes ia = (INA)ifa_ifwithnet((SA)&ipaddr); 903df8bae1dSRodney W. Grimes } else 904df8bae1dSRodney W. Grimes ia = ip_rtaddr(ipaddr.sin_addr); 905df8bae1dSRodney W. Grimes if (ia == 0) { 906df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 907df8bae1dSRodney W. Grimes code = ICMP_UNREACH_SRCFAIL; 908df8bae1dSRodney W. Grimes goto bad; 909df8bae1dSRodney W. Grimes } 910df8bae1dSRodney W. Grimes ip->ip_dst = ipaddr.sin_addr; 91194a5d9b6SDavid Greenman (void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr), 91294a5d9b6SDavid Greenman sizeof(struct in_addr)); 913df8bae1dSRodney W. Grimes cp[IPOPT_OFFSET] += sizeof(struct in_addr); 914df8bae1dSRodney W. Grimes /* 915df8bae1dSRodney W. Grimes * Let ip_intr's mcast routing check handle mcast pkts 916df8bae1dSRodney W. Grimes */ 917df8bae1dSRodney W. Grimes forward = !IN_MULTICAST(ntohl(ip->ip_dst.s_addr)); 918df8bae1dSRodney W. Grimes break; 919df8bae1dSRodney W. Grimes 920df8bae1dSRodney W. Grimes case IPOPT_RR: 921df8bae1dSRodney W. Grimes if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) { 922df8bae1dSRodney W. Grimes code = &cp[IPOPT_OFFSET] - (u_char *)ip; 923df8bae1dSRodney W. Grimes goto bad; 924df8bae1dSRodney W. Grimes } 925df8bae1dSRodney W. Grimes /* 926df8bae1dSRodney W. Grimes * If no space remains, ignore. 927df8bae1dSRodney W. Grimes */ 928df8bae1dSRodney W. Grimes off--; /* 0 origin */ 929df8bae1dSRodney W. Grimes if (off > optlen - sizeof(struct in_addr)) 930df8bae1dSRodney W. Grimes break; 93194a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, &ip->ip_dst, 932df8bae1dSRodney W. Grimes sizeof(ipaddr.sin_addr)); 933df8bae1dSRodney W. Grimes /* 934df8bae1dSRodney W. Grimes * locate outgoing interface; if we're the destination, 935df8bae1dSRodney W. Grimes * use the incoming interface (should be same). 936df8bae1dSRodney W. Grimes */ 937df8bae1dSRodney W. Grimes if ((ia = (INA)ifa_ifwithaddr((SA)&ipaddr)) == 0 && 938df8bae1dSRodney W. Grimes (ia = ip_rtaddr(ipaddr.sin_addr)) == 0) { 939df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 940df8bae1dSRodney W. Grimes code = ICMP_UNREACH_HOST; 941df8bae1dSRodney W. Grimes goto bad; 942df8bae1dSRodney W. Grimes } 94394a5d9b6SDavid Greenman (void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr), 94494a5d9b6SDavid Greenman sizeof(struct in_addr)); 945df8bae1dSRodney W. Grimes cp[IPOPT_OFFSET] += sizeof(struct in_addr); 946df8bae1dSRodney W. Grimes break; 947df8bae1dSRodney W. Grimes 948df8bae1dSRodney W. Grimes case IPOPT_TS: 949df8bae1dSRodney W. Grimes code = cp - (u_char *)ip; 950df8bae1dSRodney W. Grimes ipt = (struct ip_timestamp *)cp; 951df8bae1dSRodney W. Grimes if (ipt->ipt_len < 5) 952df8bae1dSRodney W. Grimes goto bad; 953df8bae1dSRodney W. Grimes if (ipt->ipt_ptr > ipt->ipt_len - sizeof (long)) { 954df8bae1dSRodney W. Grimes if (++ipt->ipt_oflw == 0) 955df8bae1dSRodney W. Grimes goto bad; 956df8bae1dSRodney W. Grimes break; 957df8bae1dSRodney W. Grimes } 958df8bae1dSRodney W. Grimes sin = (struct in_addr *)(cp + ipt->ipt_ptr - 1); 959df8bae1dSRodney W. Grimes switch (ipt->ipt_flg) { 960df8bae1dSRodney W. Grimes 961df8bae1dSRodney W. Grimes case IPOPT_TS_TSONLY: 962df8bae1dSRodney W. Grimes break; 963df8bae1dSRodney W. Grimes 964df8bae1dSRodney W. Grimes case IPOPT_TS_TSANDADDR: 965df8bae1dSRodney W. Grimes if (ipt->ipt_ptr + sizeof(n_time) + 966df8bae1dSRodney W. Grimes sizeof(struct in_addr) > ipt->ipt_len) 967df8bae1dSRodney W. Grimes goto bad; 968df8bae1dSRodney W. Grimes ipaddr.sin_addr = dst; 969df8bae1dSRodney W. Grimes ia = (INA)ifaof_ifpforaddr((SA)&ipaddr, 970df8bae1dSRodney W. Grimes m->m_pkthdr.rcvif); 971df8bae1dSRodney W. Grimes if (ia == 0) 972df8bae1dSRodney W. Grimes continue; 97394a5d9b6SDavid Greenman (void)memcpy(sin, &IA_SIN(ia)->sin_addr, 97494a5d9b6SDavid Greenman sizeof(struct in_addr)); 975df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(struct in_addr); 976df8bae1dSRodney W. Grimes break; 977df8bae1dSRodney W. Grimes 978df8bae1dSRodney W. Grimes case IPOPT_TS_PRESPEC: 979df8bae1dSRodney W. Grimes if (ipt->ipt_ptr + sizeof(n_time) + 980df8bae1dSRodney W. Grimes sizeof(struct in_addr) > ipt->ipt_len) 981df8bae1dSRodney W. Grimes goto bad; 98294a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, sin, 983df8bae1dSRodney W. Grimes sizeof(struct in_addr)); 984df8bae1dSRodney W. Grimes if (ifa_ifwithaddr((SA)&ipaddr) == 0) 985df8bae1dSRodney W. Grimes continue; 986df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(struct in_addr); 987df8bae1dSRodney W. Grimes break; 988df8bae1dSRodney W. Grimes 989df8bae1dSRodney W. Grimes default: 990df8bae1dSRodney W. Grimes goto bad; 991df8bae1dSRodney W. Grimes } 992df8bae1dSRodney W. Grimes ntime = iptime(); 99394a5d9b6SDavid Greenman (void)memcpy(cp + ipt->ipt_ptr - 1, &ntime, 994df8bae1dSRodney W. Grimes sizeof(n_time)); 995df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(n_time); 996df8bae1dSRodney W. Grimes } 997df8bae1dSRodney W. Grimes } 998df8bae1dSRodney W. Grimes if (forward) { 999df8bae1dSRodney W. Grimes ip_forward(m, 1); 1000df8bae1dSRodney W. Grimes return (1); 1001df8bae1dSRodney W. Grimes } 1002df8bae1dSRodney W. Grimes return (0); 1003df8bae1dSRodney W. Grimes bad: 100458938916SGarrett Wollman ip->ip_len -= IP_VHL_HL(ip->ip_vhl) << 2; /* XXX icmp_error adds in hdr length */ 1005df8bae1dSRodney W. Grimes icmp_error(m, type, code, 0, 0); 1006df8bae1dSRodney W. Grimes ipstat.ips_badoptions++; 1007df8bae1dSRodney W. Grimes return (1); 1008df8bae1dSRodney W. Grimes } 1009df8bae1dSRodney W. Grimes 1010df8bae1dSRodney W. Grimes /* 1011df8bae1dSRodney W. Grimes * Given address of next destination (final or next hop), 1012df8bae1dSRodney W. Grimes * return internet address info of interface to be used to get there. 1013df8bae1dSRodney W. Grimes */ 10140312fbe9SPoul-Henning Kamp static struct in_ifaddr * 1015df8bae1dSRodney W. Grimes ip_rtaddr(dst) 1016df8bae1dSRodney W. Grimes struct in_addr dst; 1017df8bae1dSRodney W. Grimes { 1018df8bae1dSRodney W. Grimes register struct sockaddr_in *sin; 1019df8bae1dSRodney W. Grimes 1020df8bae1dSRodney W. Grimes sin = (struct sockaddr_in *) &ipforward_rt.ro_dst; 1021df8bae1dSRodney W. Grimes 1022df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0 || dst.s_addr != sin->sin_addr.s_addr) { 1023df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) { 1024df8bae1dSRodney W. Grimes RTFREE(ipforward_rt.ro_rt); 1025df8bae1dSRodney W. Grimes ipforward_rt.ro_rt = 0; 1026df8bae1dSRodney W. Grimes } 1027df8bae1dSRodney W. Grimes sin->sin_family = AF_INET; 1028df8bae1dSRodney W. Grimes sin->sin_len = sizeof(*sin); 1029df8bae1dSRodney W. Grimes sin->sin_addr = dst; 1030df8bae1dSRodney W. Grimes 10312c17fe93SGarrett Wollman rtalloc_ign(&ipforward_rt, RTF_PRCLONING); 1032df8bae1dSRodney W. Grimes } 1033df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0) 1034df8bae1dSRodney W. Grimes return ((struct in_ifaddr *)0); 1035df8bae1dSRodney W. Grimes return ((struct in_ifaddr *) ipforward_rt.ro_rt->rt_ifa); 1036df8bae1dSRodney W. Grimes } 1037df8bae1dSRodney W. Grimes 1038df8bae1dSRodney W. Grimes /* 1039df8bae1dSRodney W. Grimes * Save incoming source route for use in replies, 1040df8bae1dSRodney W. Grimes * to be picked up later by ip_srcroute if the receiver is interested. 1041df8bae1dSRodney W. Grimes */ 1042df8bae1dSRodney W. Grimes void 1043df8bae1dSRodney W. Grimes save_rte(option, dst) 1044df8bae1dSRodney W. Grimes u_char *option; 1045df8bae1dSRodney W. Grimes struct in_addr dst; 1046df8bae1dSRodney W. Grimes { 1047df8bae1dSRodney W. Grimes unsigned olen; 1048df8bae1dSRodney W. Grimes 1049df8bae1dSRodney W. Grimes olen = option[IPOPT_OLEN]; 1050df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1051df8bae1dSRodney W. Grimes if (ipprintfs) 1052df8bae1dSRodney W. Grimes printf("save_rte: olen %d\n", olen); 1053df8bae1dSRodney W. Grimes #endif 1054df8bae1dSRodney W. Grimes if (olen > sizeof(ip_srcrt) - (1 + sizeof(dst))) 1055df8bae1dSRodney W. Grimes return; 10560453d3cbSBruce Evans bcopy(option, ip_srcrt.srcopt, olen); 1057df8bae1dSRodney W. Grimes ip_nhops = (olen - IPOPT_OFFSET - 1) / sizeof(struct in_addr); 1058df8bae1dSRodney W. Grimes ip_srcrt.dst = dst; 1059df8bae1dSRodney W. Grimes } 1060df8bae1dSRodney W. Grimes 1061df8bae1dSRodney W. Grimes /* 1062df8bae1dSRodney W. Grimes * Retrieve incoming source route for use in replies, 1063df8bae1dSRodney W. Grimes * in the same form used by setsockopt. 1064df8bae1dSRodney W. Grimes * The first hop is placed before the options, will be removed later. 1065df8bae1dSRodney W. Grimes */ 1066df8bae1dSRodney W. Grimes struct mbuf * 1067df8bae1dSRodney W. Grimes ip_srcroute() 1068df8bae1dSRodney W. Grimes { 1069df8bae1dSRodney W. Grimes register struct in_addr *p, *q; 1070df8bae1dSRodney W. Grimes register struct mbuf *m; 1071df8bae1dSRodney W. Grimes 1072df8bae1dSRodney W. Grimes if (ip_nhops == 0) 1073df8bae1dSRodney W. Grimes return ((struct mbuf *)0); 1074df8bae1dSRodney W. Grimes m = m_get(M_DONTWAIT, MT_SOOPTS); 1075df8bae1dSRodney W. Grimes if (m == 0) 1076df8bae1dSRodney W. Grimes return ((struct mbuf *)0); 1077df8bae1dSRodney W. Grimes 1078df8bae1dSRodney W. Grimes #define OPTSIZ (sizeof(ip_srcrt.nop) + sizeof(ip_srcrt.srcopt)) 1079df8bae1dSRodney W. Grimes 1080df8bae1dSRodney W. Grimes /* length is (nhops+1)*sizeof(addr) + sizeof(nop + srcrt header) */ 1081df8bae1dSRodney W. Grimes m->m_len = ip_nhops * sizeof(struct in_addr) + sizeof(struct in_addr) + 1082df8bae1dSRodney W. Grimes OPTSIZ; 1083df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1084df8bae1dSRodney W. Grimes if (ipprintfs) 1085df8bae1dSRodney W. Grimes printf("ip_srcroute: nhops %d mlen %d", ip_nhops, m->m_len); 1086df8bae1dSRodney W. Grimes #endif 1087df8bae1dSRodney W. Grimes 1088df8bae1dSRodney W. Grimes /* 1089df8bae1dSRodney W. Grimes * First save first hop for return route 1090df8bae1dSRodney W. Grimes */ 1091df8bae1dSRodney W. Grimes p = &ip_srcrt.route[ip_nhops - 1]; 1092df8bae1dSRodney W. Grimes *(mtod(m, struct in_addr *)) = *p--; 1093df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1094df8bae1dSRodney W. Grimes if (ipprintfs) 1095df8bae1dSRodney W. Grimes printf(" hops %lx", ntohl(mtod(m, struct in_addr *)->s_addr)); 1096df8bae1dSRodney W. Grimes #endif 1097df8bae1dSRodney W. Grimes 1098df8bae1dSRodney W. Grimes /* 1099df8bae1dSRodney W. Grimes * Copy option fields and padding (nop) to mbuf. 1100df8bae1dSRodney W. Grimes */ 1101df8bae1dSRodney W. Grimes ip_srcrt.nop = IPOPT_NOP; 1102df8bae1dSRodney W. Grimes ip_srcrt.srcopt[IPOPT_OFFSET] = IPOPT_MINOFF; 110394a5d9b6SDavid Greenman (void)memcpy(mtod(m, caddr_t) + sizeof(struct in_addr), 110494a5d9b6SDavid Greenman &ip_srcrt.nop, OPTSIZ); 1105df8bae1dSRodney W. Grimes q = (struct in_addr *)(mtod(m, caddr_t) + 1106df8bae1dSRodney W. Grimes sizeof(struct in_addr) + OPTSIZ); 1107df8bae1dSRodney W. Grimes #undef OPTSIZ 1108df8bae1dSRodney W. Grimes /* 1109df8bae1dSRodney W. Grimes * Record return path as an IP source route, 1110df8bae1dSRodney W. Grimes * reversing the path (pointers are now aligned). 1111df8bae1dSRodney W. Grimes */ 1112df8bae1dSRodney W. Grimes while (p >= ip_srcrt.route) { 1113df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1114df8bae1dSRodney W. Grimes if (ipprintfs) 1115df8bae1dSRodney W. Grimes printf(" %lx", ntohl(q->s_addr)); 1116df8bae1dSRodney W. Grimes #endif 1117df8bae1dSRodney W. Grimes *q++ = *p--; 1118df8bae1dSRodney W. Grimes } 1119df8bae1dSRodney W. Grimes /* 1120df8bae1dSRodney W. Grimes * Last hop goes to final destination. 1121df8bae1dSRodney W. Grimes */ 1122df8bae1dSRodney W. Grimes *q = ip_srcrt.dst; 1123df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1124df8bae1dSRodney W. Grimes if (ipprintfs) 1125df8bae1dSRodney W. Grimes printf(" %lx\n", ntohl(q->s_addr)); 1126df8bae1dSRodney W. Grimes #endif 1127df8bae1dSRodney W. Grimes return (m); 1128df8bae1dSRodney W. Grimes } 1129df8bae1dSRodney W. Grimes 1130df8bae1dSRodney W. Grimes /* 1131df8bae1dSRodney W. Grimes * Strip out IP options, at higher 1132df8bae1dSRodney W. Grimes * level protocol in the kernel. 1133df8bae1dSRodney W. Grimes * Second argument is buffer to which options 1134df8bae1dSRodney W. Grimes * will be moved, and return value is their length. 1135df8bae1dSRodney W. Grimes * XXX should be deleted; last arg currently ignored. 1136df8bae1dSRodney W. Grimes */ 1137df8bae1dSRodney W. Grimes void 1138df8bae1dSRodney W. Grimes ip_stripoptions(m, mopt) 1139df8bae1dSRodney W. Grimes register struct mbuf *m; 1140df8bae1dSRodney W. Grimes struct mbuf *mopt; 1141df8bae1dSRodney W. Grimes { 1142df8bae1dSRodney W. Grimes register int i; 1143df8bae1dSRodney W. Grimes struct ip *ip = mtod(m, struct ip *); 1144df8bae1dSRodney W. Grimes register caddr_t opts; 1145df8bae1dSRodney W. Grimes int olen; 1146df8bae1dSRodney W. Grimes 114758938916SGarrett Wollman olen = (IP_VHL_HL(ip->ip_vhl) << 2) - sizeof (struct ip); 1148df8bae1dSRodney W. Grimes opts = (caddr_t)(ip + 1); 1149df8bae1dSRodney W. Grimes i = m->m_len - (sizeof (struct ip) + olen); 1150df8bae1dSRodney W. Grimes bcopy(opts + olen, opts, (unsigned)i); 1151df8bae1dSRodney W. Grimes m->m_len -= olen; 1152df8bae1dSRodney W. Grimes if (m->m_flags & M_PKTHDR) 1153df8bae1dSRodney W. Grimes m->m_pkthdr.len -= olen; 115458938916SGarrett Wollman ip->ip_vhl = IP_MAKE_VHL(IPVERSION, sizeof(struct ip) >> 2); 1155df8bae1dSRodney W. Grimes } 1156df8bae1dSRodney W. Grimes 1157df8bae1dSRodney W. Grimes u_char inetctlerrmap[PRC_NCMDS] = { 1158df8bae1dSRodney W. Grimes 0, 0, 0, 0, 1159df8bae1dSRodney W. Grimes 0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, 1160df8bae1dSRodney W. Grimes EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, 1161df8bae1dSRodney W. Grimes EMSGSIZE, EHOSTUNREACH, 0, 0, 1162df8bae1dSRodney W. Grimes 0, 0, 0, 0, 1163df8bae1dSRodney W. Grimes ENOPROTOOPT 1164df8bae1dSRodney W. Grimes }; 1165df8bae1dSRodney W. Grimes 1166df8bae1dSRodney W. Grimes /* 1167df8bae1dSRodney W. Grimes * Forward a packet. If some error occurs return the sender 1168df8bae1dSRodney W. Grimes * an icmp packet. Note we can't always generate a meaningful 1169df8bae1dSRodney W. Grimes * icmp message because icmp doesn't have a large enough repertoire 1170df8bae1dSRodney W. Grimes * of codes and types. 1171df8bae1dSRodney W. Grimes * 1172df8bae1dSRodney W. Grimes * If not forwarding, just drop the packet. This could be confusing 1173df8bae1dSRodney W. Grimes * if ipforwarding was zero but some routing protocol was advancing 1174df8bae1dSRodney W. Grimes * us as a gateway to somewhere. However, we must let the routing 1175df8bae1dSRodney W. Grimes * protocol deal with that. 1176df8bae1dSRodney W. Grimes * 1177df8bae1dSRodney W. Grimes * The srcrt parameter indicates whether the packet is being forwarded 1178df8bae1dSRodney W. Grimes * via a source route. 1179df8bae1dSRodney W. Grimes */ 11800312fbe9SPoul-Henning Kamp static void 1181df8bae1dSRodney W. Grimes ip_forward(m, srcrt) 1182df8bae1dSRodney W. Grimes struct mbuf *m; 1183df8bae1dSRodney W. Grimes int srcrt; 1184df8bae1dSRodney W. Grimes { 1185df8bae1dSRodney W. Grimes register struct ip *ip = mtod(m, struct ip *); 1186df8bae1dSRodney W. Grimes register struct sockaddr_in *sin; 1187df8bae1dSRodney W. Grimes register struct rtentry *rt; 118826f9a767SRodney W. Grimes int error, type = 0, code = 0; 1189df8bae1dSRodney W. Grimes struct mbuf *mcopy; 1190df8bae1dSRodney W. Grimes n_long dest; 1191df8bae1dSRodney W. Grimes struct ifnet *destifp; 1192df8bae1dSRodney W. Grimes 1193df8bae1dSRodney W. Grimes dest = 0; 1194df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1195df8bae1dSRodney W. Grimes if (ipprintfs) 119661ce519bSPoul-Henning Kamp printf("forward: src %lx dst %lx ttl %x\n", 1197623ae52eSPoul-Henning Kamp ip->ip_src.s_addr, ip->ip_dst.s_addr, ip->ip_ttl); 1198df8bae1dSRodney W. Grimes #endif 1199100ba1a6SJordan K. Hubbard 1200100ba1a6SJordan K. Hubbard 1201df8bae1dSRodney W. Grimes if (m->m_flags & M_BCAST || in_canforward(ip->ip_dst) == 0) { 1202df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 1203df8bae1dSRodney W. Grimes m_freem(m); 1204df8bae1dSRodney W. Grimes return; 1205df8bae1dSRodney W. Grimes } 1206df8bae1dSRodney W. Grimes HTONS(ip->ip_id); 1207df8bae1dSRodney W. Grimes if (ip->ip_ttl <= IPTTLDEC) { 1208df8bae1dSRodney W. Grimes icmp_error(m, ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS, dest, 0); 1209df8bae1dSRodney W. Grimes return; 1210df8bae1dSRodney W. Grimes } 1211df8bae1dSRodney W. Grimes ip->ip_ttl -= IPTTLDEC; 1212df8bae1dSRodney W. Grimes 1213df8bae1dSRodney W. Grimes sin = (struct sockaddr_in *)&ipforward_rt.ro_dst; 1214df8bae1dSRodney W. Grimes if ((rt = ipforward_rt.ro_rt) == 0 || 1215df8bae1dSRodney W. Grimes ip->ip_dst.s_addr != sin->sin_addr.s_addr) { 1216df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) { 1217df8bae1dSRodney W. Grimes RTFREE(ipforward_rt.ro_rt); 1218df8bae1dSRodney W. Grimes ipforward_rt.ro_rt = 0; 1219df8bae1dSRodney W. Grimes } 1220df8bae1dSRodney W. Grimes sin->sin_family = AF_INET; 1221df8bae1dSRodney W. Grimes sin->sin_len = sizeof(*sin); 1222df8bae1dSRodney W. Grimes sin->sin_addr = ip->ip_dst; 1223df8bae1dSRodney W. Grimes 12242c17fe93SGarrett Wollman rtalloc_ign(&ipforward_rt, RTF_PRCLONING); 1225df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0) { 1226df8bae1dSRodney W. Grimes icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, dest, 0); 1227df8bae1dSRodney W. Grimes return; 1228df8bae1dSRodney W. Grimes } 1229df8bae1dSRodney W. Grimes rt = ipforward_rt.ro_rt; 1230df8bae1dSRodney W. Grimes } 1231df8bae1dSRodney W. Grimes 1232df8bae1dSRodney W. Grimes /* 1233df8bae1dSRodney W. Grimes * Save at most 64 bytes of the packet in case 1234df8bae1dSRodney W. Grimes * we need to generate an ICMP message to the src. 1235df8bae1dSRodney W. Grimes */ 1236df8bae1dSRodney W. Grimes mcopy = m_copy(m, 0, imin((int)ip->ip_len, 64)); 1237df8bae1dSRodney W. Grimes 1238df8bae1dSRodney W. Grimes /* 1239df8bae1dSRodney W. Grimes * If forwarding packet using same interface that it came in on, 1240df8bae1dSRodney W. Grimes * perhaps should send a redirect to sender to shortcut a hop. 1241df8bae1dSRodney W. Grimes * Only send redirect if source is sending directly to us, 1242df8bae1dSRodney W. Grimes * and if packet was not source routed (or has any options). 1243df8bae1dSRodney W. Grimes * Also, don't send redirect if forwarding using a default route 1244df8bae1dSRodney W. Grimes * or a route modified by a redirect. 1245df8bae1dSRodney W. Grimes */ 1246df8bae1dSRodney W. Grimes #define satosin(sa) ((struct sockaddr_in *)(sa)) 1247df8bae1dSRodney W. Grimes if (rt->rt_ifp == m->m_pkthdr.rcvif && 1248df8bae1dSRodney W. Grimes (rt->rt_flags & (RTF_DYNAMIC|RTF_MODIFIED)) == 0 && 1249df8bae1dSRodney W. Grimes satosin(rt_key(rt))->sin_addr.s_addr != 0 && 1250df8bae1dSRodney W. Grimes ipsendredirects && !srcrt) { 1251df8bae1dSRodney W. Grimes #define RTA(rt) ((struct in_ifaddr *)(rt->rt_ifa)) 1252df8bae1dSRodney W. Grimes u_long src = ntohl(ip->ip_src.s_addr); 1253df8bae1dSRodney W. Grimes 1254df8bae1dSRodney W. Grimes if (RTA(rt) && 1255df8bae1dSRodney W. Grimes (src & RTA(rt)->ia_subnetmask) == RTA(rt)->ia_subnet) { 1256df8bae1dSRodney W. Grimes if (rt->rt_flags & RTF_GATEWAY) 1257df8bae1dSRodney W. Grimes dest = satosin(rt->rt_gateway)->sin_addr.s_addr; 1258df8bae1dSRodney W. Grimes else 1259df8bae1dSRodney W. Grimes dest = ip->ip_dst.s_addr; 1260df8bae1dSRodney W. Grimes /* Router requirements says to only send host redirects */ 1261df8bae1dSRodney W. Grimes type = ICMP_REDIRECT; 1262df8bae1dSRodney W. Grimes code = ICMP_REDIRECT_HOST; 1263df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1264df8bae1dSRodney W. Grimes if (ipprintfs) 1265df8bae1dSRodney W. Grimes printf("redirect (%d) to %lx\n", code, (u_long)dest); 1266df8bae1dSRodney W. Grimes #endif 1267df8bae1dSRodney W. Grimes } 1268df8bae1dSRodney W. Grimes } 1269df8bae1dSRodney W. Grimes 1270b97d15cbSGarrett Wollman error = ip_output(m, (struct mbuf *)0, &ipforward_rt, 1271b97d15cbSGarrett Wollman IP_FORWARDING, 0); 1272df8bae1dSRodney W. Grimes if (error) 1273df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 1274df8bae1dSRodney W. Grimes else { 1275df8bae1dSRodney W. Grimes ipstat.ips_forward++; 1276df8bae1dSRodney W. Grimes if (type) 1277df8bae1dSRodney W. Grimes ipstat.ips_redirectsent++; 1278df8bae1dSRodney W. Grimes else { 1279df8bae1dSRodney W. Grimes if (mcopy) 1280df8bae1dSRodney W. Grimes m_freem(mcopy); 1281df8bae1dSRodney W. Grimes return; 1282df8bae1dSRodney W. Grimes } 1283df8bae1dSRodney W. Grimes } 1284df8bae1dSRodney W. Grimes if (mcopy == NULL) 1285df8bae1dSRodney W. Grimes return; 1286df8bae1dSRodney W. Grimes destifp = NULL; 1287df8bae1dSRodney W. Grimes 1288df8bae1dSRodney W. Grimes switch (error) { 1289df8bae1dSRodney W. Grimes 1290df8bae1dSRodney W. Grimes case 0: /* forwarded, but need redirect */ 1291df8bae1dSRodney W. Grimes /* type, code set above */ 1292df8bae1dSRodney W. Grimes break; 1293df8bae1dSRodney W. Grimes 1294df8bae1dSRodney W. Grimes case ENETUNREACH: /* shouldn't happen, checked above */ 1295df8bae1dSRodney W. Grimes case EHOSTUNREACH: 1296df8bae1dSRodney W. Grimes case ENETDOWN: 1297df8bae1dSRodney W. Grimes case EHOSTDOWN: 1298df8bae1dSRodney W. Grimes default: 1299df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 1300df8bae1dSRodney W. Grimes code = ICMP_UNREACH_HOST; 1301df8bae1dSRodney W. Grimes break; 1302df8bae1dSRodney W. Grimes 1303df8bae1dSRodney W. Grimes case EMSGSIZE: 1304df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 1305df8bae1dSRodney W. Grimes code = ICMP_UNREACH_NEEDFRAG; 1306df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) 1307df8bae1dSRodney W. Grimes destifp = ipforward_rt.ro_rt->rt_ifp; 1308df8bae1dSRodney W. Grimes ipstat.ips_cantfrag++; 1309df8bae1dSRodney W. Grimes break; 1310df8bae1dSRodney W. Grimes 1311df8bae1dSRodney W. Grimes case ENOBUFS: 1312df8bae1dSRodney W. Grimes type = ICMP_SOURCEQUENCH; 1313df8bae1dSRodney W. Grimes code = 0; 1314df8bae1dSRodney W. Grimes break; 1315df8bae1dSRodney W. Grimes } 1316df8bae1dSRodney W. Grimes icmp_error(mcopy, type, code, dest, destifp); 1317df8bae1dSRodney W. Grimes } 1318df8bae1dSRodney W. Grimes 131982c23ebaSBill Fenner void 132082c23ebaSBill Fenner ip_savecontrol(inp, mp, ip, m) 132182c23ebaSBill Fenner register struct inpcb *inp; 132282c23ebaSBill Fenner register struct mbuf **mp; 132382c23ebaSBill Fenner register struct ip *ip; 132482c23ebaSBill Fenner register struct mbuf *m; 132582c23ebaSBill Fenner { 132682c23ebaSBill Fenner if (inp->inp_socket->so_options & SO_TIMESTAMP) { 132782c23ebaSBill Fenner struct timeval tv; 132882c23ebaSBill Fenner 132982c23ebaSBill Fenner microtime(&tv); 133082c23ebaSBill Fenner *mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv), 133182c23ebaSBill Fenner SCM_TIMESTAMP, SOL_SOCKET); 133282c23ebaSBill Fenner if (*mp) 133382c23ebaSBill Fenner mp = &(*mp)->m_next; 133482c23ebaSBill Fenner } 133582c23ebaSBill Fenner if (inp->inp_flags & INP_RECVDSTADDR) { 133682c23ebaSBill Fenner *mp = sbcreatecontrol((caddr_t) &ip->ip_dst, 133782c23ebaSBill Fenner sizeof(struct in_addr), IP_RECVDSTADDR, IPPROTO_IP); 133882c23ebaSBill Fenner if (*mp) 133982c23ebaSBill Fenner mp = &(*mp)->m_next; 134082c23ebaSBill Fenner } 134182c23ebaSBill Fenner #ifdef notyet 134282c23ebaSBill Fenner /* XXX 134382c23ebaSBill Fenner * Moving these out of udp_input() made them even more broken 134482c23ebaSBill Fenner * than they already were. 134582c23ebaSBill Fenner */ 134682c23ebaSBill Fenner /* options were tossed already */ 134782c23ebaSBill Fenner if (inp->inp_flags & INP_RECVOPTS) { 134882c23ebaSBill Fenner *mp = sbcreatecontrol((caddr_t) opts_deleted_above, 134982c23ebaSBill Fenner sizeof(struct in_addr), IP_RECVOPTS, IPPROTO_IP); 135082c23ebaSBill Fenner if (*mp) 135182c23ebaSBill Fenner mp = &(*mp)->m_next; 135282c23ebaSBill Fenner } 135382c23ebaSBill Fenner /* ip_srcroute doesn't do what we want here, need to fix */ 135482c23ebaSBill Fenner if (inp->inp_flags & INP_RECVRETOPTS) { 135582c23ebaSBill Fenner *mp = sbcreatecontrol((caddr_t) ip_srcroute(), 135682c23ebaSBill Fenner sizeof(struct in_addr), IP_RECVRETOPTS, IPPROTO_IP); 135782c23ebaSBill Fenner if (*mp) 135882c23ebaSBill Fenner mp = &(*mp)->m_next; 135982c23ebaSBill Fenner } 136082c23ebaSBill Fenner #endif 136182c23ebaSBill Fenner if (inp->inp_flags & INP_RECVIF) { 136282c23ebaSBill Fenner struct sockaddr_dl sdl; 136382c23ebaSBill Fenner 136482c23ebaSBill Fenner sdl.sdl_len = offsetof(struct sockaddr_dl, sdl_data[0]); 136582c23ebaSBill Fenner sdl.sdl_family = AF_LINK; 136682c23ebaSBill Fenner sdl.sdl_index = m->m_pkthdr.rcvif ? 136782c23ebaSBill Fenner m->m_pkthdr.rcvif->if_index : 0; 136882c23ebaSBill Fenner sdl.sdl_nlen = sdl.sdl_alen = sdl.sdl_slen = 0; 136982c23ebaSBill Fenner *mp = sbcreatecontrol((caddr_t) &sdl, sdl.sdl_len, 137082c23ebaSBill Fenner IP_RECVIF, IPPROTO_IP); 137182c23ebaSBill Fenner if (*mp) 137282c23ebaSBill Fenner mp = &(*mp)->m_next; 137382c23ebaSBill Fenner } 137482c23ebaSBill Fenner } 137582c23ebaSBill Fenner 1376df8bae1dSRodney W. Grimes int 1377f0068c4aSGarrett Wollman ip_rsvp_init(struct socket *so) 1378f0068c4aSGarrett Wollman { 1379f0068c4aSGarrett Wollman if (so->so_type != SOCK_RAW || 1380f0068c4aSGarrett Wollman so->so_proto->pr_protocol != IPPROTO_RSVP) 1381f0068c4aSGarrett Wollman return EOPNOTSUPP; 1382f0068c4aSGarrett Wollman 1383f0068c4aSGarrett Wollman if (ip_rsvpd != NULL) 1384f0068c4aSGarrett Wollman return EADDRINUSE; 1385f0068c4aSGarrett Wollman 1386f0068c4aSGarrett Wollman ip_rsvpd = so; 13871c5de19aSGarrett Wollman /* 13881c5de19aSGarrett Wollman * This may seem silly, but we need to be sure we don't over-increment 13891c5de19aSGarrett Wollman * the RSVP counter, in case something slips up. 13901c5de19aSGarrett Wollman */ 13911c5de19aSGarrett Wollman if (!ip_rsvp_on) { 13921c5de19aSGarrett Wollman ip_rsvp_on = 1; 13931c5de19aSGarrett Wollman rsvp_on++; 13941c5de19aSGarrett Wollman } 1395f0068c4aSGarrett Wollman 1396f0068c4aSGarrett Wollman return 0; 1397f0068c4aSGarrett Wollman } 1398f0068c4aSGarrett Wollman 1399f0068c4aSGarrett Wollman int 1400f0068c4aSGarrett Wollman ip_rsvp_done(void) 1401f0068c4aSGarrett Wollman { 1402f0068c4aSGarrett Wollman ip_rsvpd = NULL; 14031c5de19aSGarrett Wollman /* 14041c5de19aSGarrett Wollman * This may seem silly, but we need to be sure we don't over-decrement 14051c5de19aSGarrett Wollman * the RSVP counter, in case something slips up. 14061c5de19aSGarrett Wollman */ 14071c5de19aSGarrett Wollman if (ip_rsvp_on) { 14081c5de19aSGarrett Wollman ip_rsvp_on = 0; 14091c5de19aSGarrett Wollman rsvp_on--; 14101c5de19aSGarrett Wollman } 1411f0068c4aSGarrett Wollman return 0; 1412f0068c4aSGarrett Wollman } 1413