xref: /freebsd/sys/netinet/ip_input.c (revision 82c23eba89cf4963f60f4fb2b1f416904145edeb)
1df8bae1dSRodney W. Grimes /*
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1988, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 3. All advertising materials mentioning features or use of this software
14df8bae1dSRodney W. Grimes  *    must display the following acknowledgement:
15df8bae1dSRodney W. Grimes  *	This product includes software developed by the University of
16df8bae1dSRodney W. Grimes  *	California, Berkeley and its contributors.
17df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
18df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
19df8bae1dSRodney W. Grimes  *    without specific prior written permission.
20df8bae1dSRodney W. Grimes  *
21df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
32df8bae1dSRodney W. Grimes  *
33df8bae1dSRodney W. Grimes  *	@(#)ip_input.c	8.2 (Berkeley) 1/4/94
3482c23ebaSBill Fenner  * $Id: ip_input.c,v 1.50 1996/10/25 17:57:45 fenner Exp $
3558938916SGarrett Wollman  *	$ANA: ip_input.c,v 1.5 1996/09/18 14:34:59 wollman Exp $
36df8bae1dSRodney W. Grimes  */
37df8bae1dSRodney W. Grimes 
3858938916SGarrett Wollman #define	_IP_VHL
3958938916SGarrett Wollman 
4074a9466cSGary Palmer #include "opt_ipfw.h"
4174a9466cSGary Palmer 
4282c23ebaSBill Fenner #include <stddef.h>
4382c23ebaSBill Fenner 
44df8bae1dSRodney W. Grimes #include <sys/param.h>
45df8bae1dSRodney W. Grimes #include <sys/systm.h>
46df8bae1dSRodney W. Grimes #include <sys/malloc.h>
47df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
48df8bae1dSRodney W. Grimes #include <sys/domain.h>
49df8bae1dSRodney W. Grimes #include <sys/protosw.h>
50df8bae1dSRodney W. Grimes #include <sys/socket.h>
51df8bae1dSRodney W. Grimes #include <sys/errno.h>
52df8bae1dSRodney W. Grimes #include <sys/time.h>
53df8bae1dSRodney W. Grimes #include <sys/kernel.h>
541025071fSGarrett Wollman #include <sys/syslog.h>
55b5e8ce9fSBruce Evans #include <sys/sysctl.h>
56df8bae1dSRodney W. Grimes 
57df8bae1dSRodney W. Grimes #include <net/if.h>
5882c23ebaSBill Fenner #include <net/if_dl.h>
59df8bae1dSRodney W. Grimes #include <net/route.h>
60748e0b0aSGarrett Wollman #include <net/netisr.h>
61df8bae1dSRodney W. Grimes 
62df8bae1dSRodney W. Grimes #include <netinet/in.h>
63df8bae1dSRodney W. Grimes #include <netinet/in_systm.h>
64b5e8ce9fSBruce Evans #include <netinet/in_var.h>
65df8bae1dSRodney W. Grimes #include <netinet/ip.h>
66df8bae1dSRodney W. Grimes #include <netinet/in_pcb.h>
67df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
68df8bae1dSRodney W. Grimes #include <netinet/ip_var.h>
69df8bae1dSRodney W. Grimes #include <netinet/ip_icmp.h>
7058938916SGarrett Wollman #include <machine/in_cksum.h>
71df8bae1dSRodney W. Grimes 
72f0068c4aSGarrett Wollman #include <sys/socketvar.h>
736ddbf1e2SGary Palmer 
746ddbf1e2SGary Palmer #ifdef IPFIREWALL
756ddbf1e2SGary Palmer #include <netinet/ip_fw.h>
766ddbf1e2SGary Palmer #endif
776ddbf1e2SGary Palmer 
781c5de19aSGarrett Wollman int rsvp_on = 0;
79f708ef1bSPoul-Henning Kamp static int ip_rsvp_on;
80f0068c4aSGarrett Wollman struct socket *ip_rsvpd;
81f0068c4aSGarrett Wollman 
82d4fb926cSGarrett Wollman static int	ipforwarding = 0;
830312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_FORWARDING, forwarding, CTLFLAG_RW,
840312fbe9SPoul-Henning Kamp 	&ipforwarding, 0, "");
850312fbe9SPoul-Henning Kamp 
86d4fb926cSGarrett Wollman static int	ipsendredirects = 1; /* XXX */
870312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SENDREDIRECTS, redirect, CTLFLAG_RW,
880312fbe9SPoul-Henning Kamp 	&ipsendredirects, 0, "");
890312fbe9SPoul-Henning Kamp 
90df8bae1dSRodney W. Grimes int	ip_defttl = IPDEFTTL;
910312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFTTL, ttl, CTLFLAG_RW,
920312fbe9SPoul-Henning Kamp 	&ip_defttl, 0, "");
930312fbe9SPoul-Henning Kamp 
940312fbe9SPoul-Henning Kamp static int	ip_dosourceroute = 0;
950312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SOURCEROUTE, sourceroute, CTLFLAG_RW,
960312fbe9SPoul-Henning Kamp 	&ip_dosourceroute, 0, "");
97df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
980312fbe9SPoul-Henning Kamp static int	ipprintfs = 0;
99df8bae1dSRodney W. Grimes #endif
100df8bae1dSRodney W. Grimes 
101df8bae1dSRodney W. Grimes extern	struct domain inetdomain;
102df8bae1dSRodney W. Grimes extern	struct protosw inetsw[];
103df8bae1dSRodney W. Grimes u_char	ip_protox[IPPROTO_MAX];
1040312fbe9SPoul-Henning Kamp static int	ipqmaxlen = IFQ_MAXLEN;
105df8bae1dSRodney W. Grimes struct	in_ifaddr *in_ifaddr;			/* first inet address */
106df8bae1dSRodney W. Grimes struct	ifqueue ipintrq;
1070312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQMAXLEN, intr_queue_maxlen, CTLFLAG_RD,
1080312fbe9SPoul-Henning Kamp 	&ipintrq.ifq_maxlen, 0, "");
1090312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQDROPS, intr_queue_drops, CTLFLAG_RD,
1100312fbe9SPoul-Henning Kamp 	&ipintrq.ifq_drops, 0, "");
111df8bae1dSRodney W. Grimes 
112f23b4c91SGarrett Wollman struct ipstat ipstat;
113f708ef1bSPoul-Henning Kamp static struct ipq ipq;
114f23b4c91SGarrett Wollman 
1150312fbe9SPoul-Henning Kamp #ifdef IPCTL_DEFMTU
1160312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFMTU, mtu, CTLFLAG_RW,
1170312fbe9SPoul-Henning Kamp 	&ip_mtu, 0, "");
1180312fbe9SPoul-Henning Kamp #endif
1190312fbe9SPoul-Henning Kamp 
12058938916SGarrett Wollman #if !defined(COMPAT_IPFW) || COMPAT_IPFW == 1
12158938916SGarrett Wollman #undef COMPAT_IPFW
12258938916SGarrett Wollman #define COMPAT_IPFW 1
12358938916SGarrett Wollman #else
12458938916SGarrett Wollman #undef COMPAT_IPFW
12558938916SGarrett Wollman #endif
12658938916SGarrett Wollman 
12758938916SGarrett Wollman #ifdef COMPAT_IPFW
12823bf9953SPoul-Henning Kamp /* Firewall hooks */
12923bf9953SPoul-Henning Kamp ip_fw_chk_t *ip_fw_chk_ptr;
13023bf9953SPoul-Henning Kamp ip_fw_ctl_t *ip_fw_ctl_ptr;
131e7319babSPoul-Henning Kamp 
132fed1c7e9SSøren Schmidt /* IP Network Address Translation (NAT) hooks */
133fed1c7e9SSøren Schmidt ip_nat_t *ip_nat_ptr;
134fed1c7e9SSøren Schmidt ip_nat_ctl_t *ip_nat_ctl_ptr;
13558938916SGarrett Wollman #endif
136fed1c7e9SSøren Schmidt 
137e7319babSPoul-Henning Kamp /*
138df8bae1dSRodney W. Grimes  * We need to save the IP options in case a protocol wants to respond
139df8bae1dSRodney W. Grimes  * to an incoming packet over the same route if the packet got here
140df8bae1dSRodney W. Grimes  * using IP source routing.  This allows connection establishment and
141df8bae1dSRodney W. Grimes  * maintenance when the remote end is on a network that is not known
142df8bae1dSRodney W. Grimes  * to us.
143df8bae1dSRodney W. Grimes  */
1440312fbe9SPoul-Henning Kamp static int	ip_nhops = 0;
145df8bae1dSRodney W. Grimes static	struct ip_srcrt {
146df8bae1dSRodney W. Grimes 	struct	in_addr dst;			/* final destination */
147df8bae1dSRodney W. Grimes 	char	nop;				/* one NOP to align */
148df8bae1dSRodney W. Grimes 	char	srcopt[IPOPT_OFFSET + 1];	/* OPTVAL, OLEN and OFFSET */
149df8bae1dSRodney W. Grimes 	struct	in_addr route[MAX_IPOPTLEN/sizeof(struct in_addr)];
150df8bae1dSRodney W. Grimes } ip_srcrt;
151df8bae1dSRodney W. Grimes 
15293e0e116SJulian Elischer #ifdef IPDIVERT
15393e0e116SJulian Elischer /*
15493e0e116SJulian Elischer  * Shared variable between ip_input() and ip_reass() to communicate
15593e0e116SJulian Elischer  * about which packets, once assembled from fragments, get diverted,
15693e0e116SJulian Elischer  * and to which port.
15793e0e116SJulian Elischer  */
15893e0e116SJulian Elischer static u_short	frag_divert_port;
15993e0e116SJulian Elischer #endif
16093e0e116SJulian Elischer 
161df8bae1dSRodney W. Grimes static void save_rte __P((u_char *, struct in_addr));
1620312fbe9SPoul-Henning Kamp static void	 ip_deq __P((struct ipasfrag *));
1630312fbe9SPoul-Henning Kamp static int	 ip_dooptions __P((struct mbuf *));
1640312fbe9SPoul-Henning Kamp static void	 ip_enq __P((struct ipasfrag *, struct ipasfrag *));
1650312fbe9SPoul-Henning Kamp static void	 ip_forward __P((struct mbuf *, int));
1660312fbe9SPoul-Henning Kamp static void	 ip_freef __P((struct ipq *));
1670312fbe9SPoul-Henning Kamp static struct ip *
1680312fbe9SPoul-Henning Kamp 	 ip_reass __P((struct ipasfrag *, struct ipq *));
1690312fbe9SPoul-Henning Kamp static struct in_ifaddr *
1700312fbe9SPoul-Henning Kamp 	 ip_rtaddr __P((struct in_addr));
1710312fbe9SPoul-Henning Kamp static void	ipintr __P((void));
172df8bae1dSRodney W. Grimes /*
173df8bae1dSRodney W. Grimes  * IP initialization: fill in IP protocol switch table.
174df8bae1dSRodney W. Grimes  * All protocols not implemented in kernel go to raw IP protocol handler.
175df8bae1dSRodney W. Grimes  */
176df8bae1dSRodney W. Grimes void
177df8bae1dSRodney W. Grimes ip_init()
178df8bae1dSRodney W. Grimes {
179df8bae1dSRodney W. Grimes 	register struct protosw *pr;
180df8bae1dSRodney W. Grimes 	register int i;
181df8bae1dSRodney W. Grimes 
182df8bae1dSRodney W. Grimes 	pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW);
183df8bae1dSRodney W. Grimes 	if (pr == 0)
184df8bae1dSRodney W. Grimes 		panic("ip_init");
185df8bae1dSRodney W. Grimes 	for (i = 0; i < IPPROTO_MAX; i++)
186df8bae1dSRodney W. Grimes 		ip_protox[i] = pr - inetsw;
187df8bae1dSRodney W. Grimes 	for (pr = inetdomain.dom_protosw;
188df8bae1dSRodney W. Grimes 	    pr < inetdomain.dom_protoswNPROTOSW; pr++)
189df8bae1dSRodney W. Grimes 		if (pr->pr_domain->dom_family == PF_INET &&
190df8bae1dSRodney W. Grimes 		    pr->pr_protocol && pr->pr_protocol != IPPROTO_RAW)
191df8bae1dSRodney W. Grimes 			ip_protox[pr->pr_protocol] = pr - inetsw;
192df8bae1dSRodney W. Grimes 	ipq.next = ipq.prev = &ipq;
193df8bae1dSRodney W. Grimes 	ip_id = time.tv_sec & 0xffff;
194df8bae1dSRodney W. Grimes 	ipintrq.ifq_maxlen = ipqmaxlen;
195b83e4314SPoul-Henning Kamp #ifdef IPFIREWALL
196b83e4314SPoul-Henning Kamp 	ip_fw_init();
197b83e4314SPoul-Henning Kamp #endif
198fed1c7e9SSøren Schmidt #ifdef IPNAT
199fed1c7e9SSøren Schmidt         ip_nat_init();
200fed1c7e9SSøren Schmidt #endif
201fed1c7e9SSøren Schmidt 
202df8bae1dSRodney W. Grimes }
203df8bae1dSRodney W. Grimes 
2040312fbe9SPoul-Henning Kamp static struct	sockaddr_in ipaddr = { sizeof(ipaddr), AF_INET };
205f708ef1bSPoul-Henning Kamp static struct	route ipforward_rt;
206df8bae1dSRodney W. Grimes 
207df8bae1dSRodney W. Grimes /*
208df8bae1dSRodney W. Grimes  * Ip input routine.  Checksum and byte swap header.  If fragmented
209df8bae1dSRodney W. Grimes  * try to reassemble.  Process options.  Pass to next level.
210df8bae1dSRodney W. Grimes  */
211c67b1d17SGarrett Wollman void
212c67b1d17SGarrett Wollman ip_input(struct mbuf *m)
213df8bae1dSRodney W. Grimes {
21423bf9953SPoul-Henning Kamp 	struct ip *ip;
21523bf9953SPoul-Henning Kamp 	struct ipq *fp;
21623bf9953SPoul-Henning Kamp 	struct in_ifaddr *ia;
21709bb5f75SPoul-Henning Kamp 	int hlen;
218df8bae1dSRodney W. Grimes 
219df8bae1dSRodney W. Grimes #ifdef	DIAGNOSTIC
220df8bae1dSRodney W. Grimes 	if ((m->m_flags & M_PKTHDR) == 0)
22158938916SGarrett Wollman 		panic("ip_input no HDR");
222df8bae1dSRodney W. Grimes #endif
223df8bae1dSRodney W. Grimes 	/*
224df8bae1dSRodney W. Grimes 	 * If no IP addresses have been set yet but the interfaces
225df8bae1dSRodney W. Grimes 	 * are receiving, can't do anything with incoming packets yet.
226df8bae1dSRodney W. Grimes 	 */
227df8bae1dSRodney W. Grimes 	if (in_ifaddr == NULL)
228df8bae1dSRodney W. Grimes 		goto bad;
229df8bae1dSRodney W. Grimes 	ipstat.ips_total++;
23058938916SGarrett Wollman 
23158938916SGarrett Wollman 	if (m->m_pkthdr.len < sizeof(struct ip))
23258938916SGarrett Wollman 		goto tooshort;
23358938916SGarrett Wollman 
23458938916SGarrett Wollman #ifdef	DIAGNOSTIC
23558938916SGarrett Wollman 	if (m->m_len < sizeof(struct ip))
23658938916SGarrett Wollman 		panic("ipintr mbuf too short");
23758938916SGarrett Wollman #endif
23858938916SGarrett Wollman 
239df8bae1dSRodney W. Grimes 	if (m->m_len < sizeof (struct ip) &&
240df8bae1dSRodney W. Grimes 	    (m = m_pullup(m, sizeof (struct ip))) == 0) {
241df8bae1dSRodney W. Grimes 		ipstat.ips_toosmall++;
242c67b1d17SGarrett Wollman 		return;
243df8bae1dSRodney W. Grimes 	}
244df8bae1dSRodney W. Grimes 	ip = mtod(m, struct ip *);
24558938916SGarrett Wollman 
24658938916SGarrett Wollman 	if (IP_VHL_V(ip->ip_vhl) != IPVERSION) {
247df8bae1dSRodney W. Grimes 		ipstat.ips_badvers++;
248df8bae1dSRodney W. Grimes 		goto bad;
249df8bae1dSRodney W. Grimes 	}
25058938916SGarrett Wollman 
25158938916SGarrett Wollman 	hlen = IP_VHL_HL(ip->ip_vhl) << 2;
252df8bae1dSRodney W. Grimes 	if (hlen < sizeof(struct ip)) {	/* minimum header length */
253df8bae1dSRodney W. Grimes 		ipstat.ips_badhlen++;
254df8bae1dSRodney W. Grimes 		goto bad;
255df8bae1dSRodney W. Grimes 	}
256df8bae1dSRodney W. Grimes 	if (hlen > m->m_len) {
257df8bae1dSRodney W. Grimes 		if ((m = m_pullup(m, hlen)) == 0) {
258df8bae1dSRodney W. Grimes 			ipstat.ips_badhlen++;
259c67b1d17SGarrett Wollman 			return;
260df8bae1dSRodney W. Grimes 		}
261df8bae1dSRodney W. Grimes 		ip = mtod(m, struct ip *);
262df8bae1dSRodney W. Grimes 	}
26358938916SGarrett Wollman 	if (hlen == sizeof(struct ip)) {
26458938916SGarrett Wollman 		ip->ip_sum = in_cksum_hdr(ip);
26558938916SGarrett Wollman 	} else {
266623ae52eSPoul-Henning Kamp 		ip->ip_sum = in_cksum(m, hlen);
26758938916SGarrett Wollman 	}
268623ae52eSPoul-Henning Kamp 	if (ip->ip_sum) {
269df8bae1dSRodney W. Grimes 		ipstat.ips_badsum++;
270df8bae1dSRodney W. Grimes 		goto bad;
271df8bae1dSRodney W. Grimes 	}
272df8bae1dSRodney W. Grimes 
273df8bae1dSRodney W. Grimes 	/*
274df8bae1dSRodney W. Grimes 	 * Convert fields to host representation.
275df8bae1dSRodney W. Grimes 	 */
276df8bae1dSRodney W. Grimes 	NTOHS(ip->ip_len);
277df8bae1dSRodney W. Grimes 	if (ip->ip_len < hlen) {
278df8bae1dSRodney W. Grimes 		ipstat.ips_badlen++;
279df8bae1dSRodney W. Grimes 		goto bad;
280df8bae1dSRodney W. Grimes 	}
281df8bae1dSRodney W. Grimes 	NTOHS(ip->ip_id);
282df8bae1dSRodney W. Grimes 	NTOHS(ip->ip_off);
283df8bae1dSRodney W. Grimes 
284df8bae1dSRodney W. Grimes 	/*
285df8bae1dSRodney W. Grimes 	 * Check that the amount of data in the buffers
286df8bae1dSRodney W. Grimes 	 * is as at least much as the IP header would have us expect.
287df8bae1dSRodney W. Grimes 	 * Trim mbufs if longer than we expect.
288df8bae1dSRodney W. Grimes 	 * Drop packet if shorter than we expect.
289df8bae1dSRodney W. Grimes 	 */
290df8bae1dSRodney W. Grimes 	if (m->m_pkthdr.len < ip->ip_len) {
29158938916SGarrett Wollman tooshort:
292df8bae1dSRodney W. Grimes 		ipstat.ips_tooshort++;
293df8bae1dSRodney W. Grimes 		goto bad;
294df8bae1dSRodney W. Grimes 	}
295df8bae1dSRodney W. Grimes 	if (m->m_pkthdr.len > ip->ip_len) {
296df8bae1dSRodney W. Grimes 		if (m->m_len == m->m_pkthdr.len) {
297df8bae1dSRodney W. Grimes 			m->m_len = ip->ip_len;
298df8bae1dSRodney W. Grimes 			m->m_pkthdr.len = ip->ip_len;
299df8bae1dSRodney W. Grimes 		} else
300df8bae1dSRodney W. Grimes 			m_adj(m, ip->ip_len - m->m_pkthdr.len);
301df8bae1dSRodney W. Grimes 	}
3024dd1662bSUgen J.S. Antsilevich 	/*
3034dd1662bSUgen J.S. Antsilevich 	 * IpHack's section.
3044dd1662bSUgen J.S. Antsilevich 	 * Right now when no processing on packet has done
3054dd1662bSUgen J.S. Antsilevich 	 * and it is still fresh out of network we do our black
3064dd1662bSUgen J.S. Antsilevich 	 * deals with it.
30793e0e116SJulian Elischer 	 * - Firewall: deny/allow/divert
308fed1c7e9SSøren Schmidt 	 * - Xlate: translate packet's addr/port (NAT).
3094dd1662bSUgen J.S. Antsilevich 	 * - Wrap: fake packet's addr/port <unimpl.>
3104dd1662bSUgen J.S. Antsilevich 	 * - Encapsulate: put it in another IP and send out. <unimp.>
3114dd1662bSUgen J.S. Antsilevich  	 */
312df8bae1dSRodney W. Grimes 
31358938916SGarrett Wollman #ifdef COMPAT_IPFW
31493e0e116SJulian Elischer 	if (ip_fw_chk_ptr) {
31593e0e116SJulian Elischer 		int action;
31693e0e116SJulian Elischer 
31793e0e116SJulian Elischer #ifdef IPDIVERT
31893e0e116SJulian Elischer 		action = (*ip_fw_chk_ptr)(&ip, hlen,
31993e0e116SJulian Elischer 				m->m_pkthdr.rcvif, ip_divert_ignore, &m);
32093e0e116SJulian Elischer #else
32193e0e116SJulian Elischer 		action = (*ip_fw_chk_ptr)(&ip, hlen, m->m_pkthdr.rcvif, 0, &m);
32293e0e116SJulian Elischer #endif
32393e0e116SJulian Elischer 		if (action == -1)
324539e53baSPoul-Henning Kamp 			return;
32593e0e116SJulian Elischer 		if (action != 0) {
32693e0e116SJulian Elischer #ifdef IPDIVERT
32793e0e116SJulian Elischer 			frag_divert_port = action;
32893e0e116SJulian Elischer 			goto ours;
32993e0e116SJulian Elischer #else
33093e0e116SJulian Elischer 			goto bad;	/* ipfw said divert but we can't */
33193e0e116SJulian Elischer #endif
33293e0e116SJulian Elischer 		}
33393e0e116SJulian Elischer 	}
334100ba1a6SJordan K. Hubbard 
3356713d4a7SSøren Schmidt         if (ip_nat_ptr && !(*ip_nat_ptr)(&ip, &m, m->m_pkthdr.rcvif, IP_NAT_IN))
336fed1c7e9SSøren Schmidt 		return;
33758938916SGarrett Wollman #endif
338fed1c7e9SSøren Schmidt 
339df8bae1dSRodney W. Grimes 	/*
340df8bae1dSRodney W. Grimes 	 * Process options and, if not destined for us,
341df8bae1dSRodney W. Grimes 	 * ship it on.  ip_dooptions returns 1 when an
342df8bae1dSRodney W. Grimes 	 * error was detected (causing an icmp message
343df8bae1dSRodney W. Grimes 	 * to be sent and the original packet to be freed).
344df8bae1dSRodney W. Grimes 	 */
345df8bae1dSRodney W. Grimes 	ip_nhops = 0;		/* for source routed packets */
346df8bae1dSRodney W. Grimes 	if (hlen > sizeof (struct ip) && ip_dooptions(m))
347c67b1d17SGarrett Wollman 		return;
348df8bae1dSRodney W. Grimes 
349f0068c4aSGarrett Wollman         /* greedy RSVP, snatches any PATH packet of the RSVP protocol and no
350f0068c4aSGarrett Wollman          * matter if it is destined to another node, or whether it is
351f0068c4aSGarrett Wollman          * a multicast one, RSVP wants it! and prevents it from being forwarded
352f0068c4aSGarrett Wollman          * anywhere else. Also checks if the rsvp daemon is running before
353f0068c4aSGarrett Wollman 	 * grabbing the packet.
354f0068c4aSGarrett Wollman          */
3551c5de19aSGarrett Wollman 	if (rsvp_on && ip->ip_p==IPPROTO_RSVP)
356f0068c4aSGarrett Wollman 		goto ours;
357f0068c4aSGarrett Wollman 
358df8bae1dSRodney W. Grimes 	/*
359df8bae1dSRodney W. Grimes 	 * Check our list of addresses, to see if the packet is for us.
360df8bae1dSRodney W. Grimes 	 */
361df8bae1dSRodney W. Grimes 	for (ia = in_ifaddr; ia; ia = ia->ia_next) {
362df8bae1dSRodney W. Grimes #define	satosin(sa)	((struct sockaddr_in *)(sa))
363df8bae1dSRodney W. Grimes 
364df8bae1dSRodney W. Grimes 		if (IA_SIN(ia)->sin_addr.s_addr == ip->ip_dst.s_addr)
365df8bae1dSRodney W. Grimes 			goto ours;
3666ed666afSPoul-Henning Kamp 		if (ia->ia_ifp && ia->ia_ifp->if_flags & IFF_BROADCAST) {
367df8bae1dSRodney W. Grimes 			if (satosin(&ia->ia_broadaddr)->sin_addr.s_addr ==
368df8bae1dSRodney W. Grimes 			    ip->ip_dst.s_addr)
369df8bae1dSRodney W. Grimes 				goto ours;
370df8bae1dSRodney W. Grimes 			if (ip->ip_dst.s_addr == ia->ia_netbroadcast.s_addr)
371df8bae1dSRodney W. Grimes 				goto ours;
372df8bae1dSRodney W. Grimes 		}
373df8bae1dSRodney W. Grimes 	}
374df8bae1dSRodney W. Grimes 	if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr))) {
375df8bae1dSRodney W. Grimes 		struct in_multi *inm;
376df8bae1dSRodney W. Grimes 		if (ip_mrouter) {
377df8bae1dSRodney W. Grimes 			/*
378df8bae1dSRodney W. Grimes 			 * If we are acting as a multicast router, all
379df8bae1dSRodney W. Grimes 			 * incoming multicast packets are passed to the
380df8bae1dSRodney W. Grimes 			 * kernel-level multicast forwarding function.
381df8bae1dSRodney W. Grimes 			 * The packet is returned (relatively) intact; if
382df8bae1dSRodney W. Grimes 			 * ip_mforward() returns a non-zero value, the packet
383df8bae1dSRodney W. Grimes 			 * must be discarded, else it may be accepted below.
384df8bae1dSRodney W. Grimes 			 *
385df8bae1dSRodney W. Grimes 			 * (The IP ident field is put in the same byte order
386df8bae1dSRodney W. Grimes 			 * as expected when ip_mforward() is called from
387df8bae1dSRodney W. Grimes 			 * ip_output().)
388df8bae1dSRodney W. Grimes 			 */
389df8bae1dSRodney W. Grimes 			ip->ip_id = htons(ip->ip_id);
390f0068c4aSGarrett Wollman 			if (ip_mforward(ip, m->m_pkthdr.rcvif, m, 0) != 0) {
391df8bae1dSRodney W. Grimes 				ipstat.ips_cantforward++;
392df8bae1dSRodney W. Grimes 				m_freem(m);
393c67b1d17SGarrett Wollman 				return;
394df8bae1dSRodney W. Grimes 			}
395df8bae1dSRodney W. Grimes 			ip->ip_id = ntohs(ip->ip_id);
396df8bae1dSRodney W. Grimes 
397df8bae1dSRodney W. Grimes 			/*
398df8bae1dSRodney W. Grimes 			 * The process-level routing demon needs to receive
399df8bae1dSRodney W. Grimes 			 * all multicast IGMP packets, whether or not this
400df8bae1dSRodney W. Grimes 			 * host belongs to their destination groups.
401df8bae1dSRodney W. Grimes 			 */
402df8bae1dSRodney W. Grimes 			if (ip->ip_p == IPPROTO_IGMP)
403df8bae1dSRodney W. Grimes 				goto ours;
404df8bae1dSRodney W. Grimes 			ipstat.ips_forward++;
405df8bae1dSRodney W. Grimes 		}
406df8bae1dSRodney W. Grimes 		/*
407df8bae1dSRodney W. Grimes 		 * See if we belong to the destination multicast group on the
408df8bae1dSRodney W. Grimes 		 * arrival interface.
409df8bae1dSRodney W. Grimes 		 */
410df8bae1dSRodney W. Grimes 		IN_LOOKUP_MULTI(ip->ip_dst, m->m_pkthdr.rcvif, inm);
411df8bae1dSRodney W. Grimes 		if (inm == NULL) {
412df8bae1dSRodney W. Grimes 			ipstat.ips_cantforward++;
413df8bae1dSRodney W. Grimes 			m_freem(m);
414c67b1d17SGarrett Wollman 			return;
415df8bae1dSRodney W. Grimes 		}
416df8bae1dSRodney W. Grimes 		goto ours;
417df8bae1dSRodney W. Grimes 	}
418df8bae1dSRodney W. Grimes 	if (ip->ip_dst.s_addr == (u_long)INADDR_BROADCAST)
419df8bae1dSRodney W. Grimes 		goto ours;
420df8bae1dSRodney W. Grimes 	if (ip->ip_dst.s_addr == INADDR_ANY)
421df8bae1dSRodney W. Grimes 		goto ours;
422df8bae1dSRodney W. Grimes 
423df8bae1dSRodney W. Grimes 	/*
424df8bae1dSRodney W. Grimes 	 * Not for us; forward if possible and desirable.
425df8bae1dSRodney W. Grimes 	 */
426df8bae1dSRodney W. Grimes 	if (ipforwarding == 0) {
427df8bae1dSRodney W. Grimes 		ipstat.ips_cantforward++;
428df8bae1dSRodney W. Grimes 		m_freem(m);
429df8bae1dSRodney W. Grimes 	} else
430df8bae1dSRodney W. Grimes 		ip_forward(m, 0);
431c67b1d17SGarrett Wollman 	return;
432df8bae1dSRodney W. Grimes 
433df8bae1dSRodney W. Grimes ours:
434100ba1a6SJordan K. Hubbard 
43563f8d699SJordan K. Hubbard 	/*
436df8bae1dSRodney W. Grimes 	 * If offset or IP_MF are set, must reassemble.
437df8bae1dSRodney W. Grimes 	 * Otherwise, nothing need be done.
438df8bae1dSRodney W. Grimes 	 * (We could look in the reassembly queue to see
439df8bae1dSRodney W. Grimes 	 * if the packet was previously fragmented,
440df8bae1dSRodney W. Grimes 	 * but it's not worth the time; just let them time out.)
441df8bae1dSRodney W. Grimes 	 */
442df8bae1dSRodney W. Grimes 	if (ip->ip_off &~ IP_DF) {
443df8bae1dSRodney W. Grimes 		if (m->m_flags & M_EXT) {		/* XXX */
444df8bae1dSRodney W. Grimes 			if ((m = m_pullup(m, sizeof (struct ip))) == 0) {
445df8bae1dSRodney W. Grimes 				ipstat.ips_toosmall++;
44693e0e116SJulian Elischer #ifdef IPDIVERT
44793e0e116SJulian Elischer 				frag_divert_port = 0;
44893e0e116SJulian Elischer #endif
449c67b1d17SGarrett Wollman 				return;
450df8bae1dSRodney W. Grimes 			}
451df8bae1dSRodney W. Grimes 			ip = mtod(m, struct ip *);
452df8bae1dSRodney W. Grimes 		}
453df8bae1dSRodney W. Grimes 		/*
454df8bae1dSRodney W. Grimes 		 * Look for queue of fragments
455df8bae1dSRodney W. Grimes 		 * of this datagram.
456df8bae1dSRodney W. Grimes 		 */
457df8bae1dSRodney W. Grimes 		for (fp = ipq.next; fp != &ipq; fp = fp->next)
458df8bae1dSRodney W. Grimes 			if (ip->ip_id == fp->ipq_id &&
459df8bae1dSRodney W. Grimes 			    ip->ip_src.s_addr == fp->ipq_src.s_addr &&
460df8bae1dSRodney W. Grimes 			    ip->ip_dst.s_addr == fp->ipq_dst.s_addr &&
461df8bae1dSRodney W. Grimes 			    ip->ip_p == fp->ipq_p)
462df8bae1dSRodney W. Grimes 				goto found;
463df8bae1dSRodney W. Grimes 		fp = 0;
464df8bae1dSRodney W. Grimes found:
465df8bae1dSRodney W. Grimes 
466df8bae1dSRodney W. Grimes 		/*
467df8bae1dSRodney W. Grimes 		 * Adjust ip_len to not reflect header,
468df8bae1dSRodney W. Grimes 		 * set ip_mff if more fragments are expected,
469df8bae1dSRodney W. Grimes 		 * convert offset of this to bytes.
470df8bae1dSRodney W. Grimes 		 */
471df8bae1dSRodney W. Grimes 		ip->ip_len -= hlen;
472df8bae1dSRodney W. Grimes 		((struct ipasfrag *)ip)->ipf_mff &= ~1;
473df8bae1dSRodney W. Grimes 		if (ip->ip_off & IP_MF)
474df8bae1dSRodney W. Grimes 			((struct ipasfrag *)ip)->ipf_mff |= 1;
475df8bae1dSRodney W. Grimes 		ip->ip_off <<= 3;
476df8bae1dSRodney W. Grimes 
477df8bae1dSRodney W. Grimes 		/*
478df8bae1dSRodney W. Grimes 		 * If datagram marked as having more fragments
479df8bae1dSRodney W. Grimes 		 * or if this is not the first fragment,
480df8bae1dSRodney W. Grimes 		 * attempt reassembly; if it succeeds, proceed.
481df8bae1dSRodney W. Grimes 		 */
482df8bae1dSRodney W. Grimes 		if (((struct ipasfrag *)ip)->ipf_mff & 1 || ip->ip_off) {
483df8bae1dSRodney W. Grimes 			ipstat.ips_fragments++;
484df8bae1dSRodney W. Grimes 			ip = ip_reass((struct ipasfrag *)ip, fp);
485df8bae1dSRodney W. Grimes 			if (ip == 0)
486c67b1d17SGarrett Wollman 				return;
487df8bae1dSRodney W. Grimes 			ipstat.ips_reassembled++;
488df8bae1dSRodney W. Grimes 			m = dtom(ip);
489df8bae1dSRodney W. Grimes 		} else
490df8bae1dSRodney W. Grimes 			if (fp)
491df8bae1dSRodney W. Grimes 				ip_freef(fp);
492df8bae1dSRodney W. Grimes 	} else
493df8bae1dSRodney W. Grimes 		ip->ip_len -= hlen;
494df8bae1dSRodney W. Grimes 
49593e0e116SJulian Elischer #ifdef IPDIVERT
49693e0e116SJulian Elischer 	/*
49793e0e116SJulian Elischer 	 * Divert packets here to the divert protocol if required
49893e0e116SJulian Elischer 	 */
49993e0e116SJulian Elischer 	if (frag_divert_port) {
50093e0e116SJulian Elischer 		ip_divert_port = frag_divert_port;
50193e0e116SJulian Elischer 		frag_divert_port = 0;
50293e0e116SJulian Elischer 		(*inetsw[ip_protox[IPPROTO_DIVERT]].pr_input)(m, hlen);
50393e0e116SJulian Elischer 		return;
50493e0e116SJulian Elischer 	}
50593e0e116SJulian Elischer #endif
50693e0e116SJulian Elischer 
507df8bae1dSRodney W. Grimes 	/*
508df8bae1dSRodney W. Grimes 	 * Switch out to protocol's input routine.
509df8bae1dSRodney W. Grimes 	 */
510df8bae1dSRodney W. Grimes 	ipstat.ips_delivered++;
511df8bae1dSRodney W. Grimes 	(*inetsw[ip_protox[ip->ip_p]].pr_input)(m, hlen);
512c67b1d17SGarrett Wollman 	return;
513df8bae1dSRodney W. Grimes bad:
514df8bae1dSRodney W. Grimes 	m_freem(m);
515c67b1d17SGarrett Wollman }
516c67b1d17SGarrett Wollman 
517c67b1d17SGarrett Wollman /*
518c67b1d17SGarrett Wollman  * IP software interrupt routine - to go away sometime soon
519c67b1d17SGarrett Wollman  */
520c67b1d17SGarrett Wollman static void
521c67b1d17SGarrett Wollman ipintr(void)
522c67b1d17SGarrett Wollman {
523c67b1d17SGarrett Wollman 	int s;
524c67b1d17SGarrett Wollman 	struct mbuf *m;
525c67b1d17SGarrett Wollman 
526c67b1d17SGarrett Wollman 	while(1) {
527c67b1d17SGarrett Wollman 		s = splimp();
528c67b1d17SGarrett Wollman 		IF_DEQUEUE(&ipintrq, m);
529c67b1d17SGarrett Wollman 		splx(s);
530c67b1d17SGarrett Wollman 		if (m == 0)
531c67b1d17SGarrett Wollman 			return;
532c67b1d17SGarrett Wollman 		ip_input(m);
533c67b1d17SGarrett Wollman 	}
534df8bae1dSRodney W. Grimes }
535df8bae1dSRodney W. Grimes 
536748e0b0aSGarrett Wollman NETISR_SET(NETISR_IP, ipintr);
537748e0b0aSGarrett Wollman 
538df8bae1dSRodney W. Grimes /*
539df8bae1dSRodney W. Grimes  * Take incoming datagram fragment and try to
540df8bae1dSRodney W. Grimes  * reassemble it into whole datagram.  If a chain for
541df8bae1dSRodney W. Grimes  * reassembly of this datagram already exists, then it
542df8bae1dSRodney W. Grimes  * is given as fp; otherwise have to make a chain.
543df8bae1dSRodney W. Grimes  */
5440312fbe9SPoul-Henning Kamp static struct ip *
545df8bae1dSRodney W. Grimes ip_reass(ip, fp)
546df8bae1dSRodney W. Grimes 	register struct ipasfrag *ip;
547df8bae1dSRodney W. Grimes 	register struct ipq *fp;
548df8bae1dSRodney W. Grimes {
549df8bae1dSRodney W. Grimes 	register struct mbuf *m = dtom(ip);
550df8bae1dSRodney W. Grimes 	register struct ipasfrag *q;
551df8bae1dSRodney W. Grimes 	struct mbuf *t;
552df8bae1dSRodney W. Grimes 	int hlen = ip->ip_hl << 2;
553df8bae1dSRodney W. Grimes 	int i, next;
554df8bae1dSRodney W. Grimes 
555df8bae1dSRodney W. Grimes 	/*
556df8bae1dSRodney W. Grimes 	 * Presence of header sizes in mbufs
557df8bae1dSRodney W. Grimes 	 * would confuse code below.
558df8bae1dSRodney W. Grimes 	 */
559df8bae1dSRodney W. Grimes 	m->m_data += hlen;
560df8bae1dSRodney W. Grimes 	m->m_len -= hlen;
561df8bae1dSRodney W. Grimes 
562df8bae1dSRodney W. Grimes 	/*
563df8bae1dSRodney W. Grimes 	 * If first fragment to arrive, create a reassembly queue.
564df8bae1dSRodney W. Grimes 	 */
565df8bae1dSRodney W. Grimes 	if (fp == 0) {
566df8bae1dSRodney W. Grimes 		if ((t = m_get(M_DONTWAIT, MT_FTABLE)) == NULL)
567df8bae1dSRodney W. Grimes 			goto dropfrag;
568df8bae1dSRodney W. Grimes 		fp = mtod(t, struct ipq *);
569df8bae1dSRodney W. Grimes 		insque(fp, &ipq);
570df8bae1dSRodney W. Grimes 		fp->ipq_ttl = IPFRAGTTL;
571df8bae1dSRodney W. Grimes 		fp->ipq_p = ip->ip_p;
572df8bae1dSRodney W. Grimes 		fp->ipq_id = ip->ip_id;
573df8bae1dSRodney W. Grimes 		fp->ipq_next = fp->ipq_prev = (struct ipasfrag *)fp;
574df8bae1dSRodney W. Grimes 		fp->ipq_src = ((struct ip *)ip)->ip_src;
575df8bae1dSRodney W. Grimes 		fp->ipq_dst = ((struct ip *)ip)->ip_dst;
57693e0e116SJulian Elischer #ifdef IPDIVERT
57793e0e116SJulian Elischer 		fp->ipq_divert = 0;
57893e0e116SJulian Elischer #endif
579df8bae1dSRodney W. Grimes 		q = (struct ipasfrag *)fp;
580df8bae1dSRodney W. Grimes 		goto insert;
581df8bae1dSRodney W. Grimes 	}
582df8bae1dSRodney W. Grimes 
583df8bae1dSRodney W. Grimes 	/*
584df8bae1dSRodney W. Grimes 	 * Find a segment which begins after this one does.
585df8bae1dSRodney W. Grimes 	 */
586df8bae1dSRodney W. Grimes 	for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next)
587df8bae1dSRodney W. Grimes 		if (q->ip_off > ip->ip_off)
588df8bae1dSRodney W. Grimes 			break;
589df8bae1dSRodney W. Grimes 
590df8bae1dSRodney W. Grimes 	/*
591df8bae1dSRodney W. Grimes 	 * If there is a preceding segment, it may provide some of
592df8bae1dSRodney W. Grimes 	 * our data already.  If so, drop the data from the incoming
593df8bae1dSRodney W. Grimes 	 * segment.  If it provides all of our data, drop us.
594df8bae1dSRodney W. Grimes 	 */
595df8bae1dSRodney W. Grimes 	if (q->ipf_prev != (struct ipasfrag *)fp) {
596df8bae1dSRodney W. Grimes 		i = q->ipf_prev->ip_off + q->ipf_prev->ip_len - ip->ip_off;
597df8bae1dSRodney W. Grimes 		if (i > 0) {
598df8bae1dSRodney W. Grimes 			if (i >= ip->ip_len)
599df8bae1dSRodney W. Grimes 				goto dropfrag;
600df8bae1dSRodney W. Grimes 			m_adj(dtom(ip), i);
601df8bae1dSRodney W. Grimes 			ip->ip_off += i;
602df8bae1dSRodney W. Grimes 			ip->ip_len -= i;
603df8bae1dSRodney W. Grimes 		}
604df8bae1dSRodney W. Grimes 	}
605df8bae1dSRodney W. Grimes 
606df8bae1dSRodney W. Grimes 	/*
607df8bae1dSRodney W. Grimes 	 * While we overlap succeeding segments trim them or,
608df8bae1dSRodney W. Grimes 	 * if they are completely covered, dequeue them.
609df8bae1dSRodney W. Grimes 	 */
610df8bae1dSRodney W. Grimes 	while (q != (struct ipasfrag *)fp && ip->ip_off + ip->ip_len > q->ip_off) {
611e7c81944SDavid Greenman 		struct mbuf *m0;
612e7c81944SDavid Greenman 
613df8bae1dSRodney W. Grimes 		i = (ip->ip_off + ip->ip_len) - q->ip_off;
614df8bae1dSRodney W. Grimes 		if (i < q->ip_len) {
615df8bae1dSRodney W. Grimes 			q->ip_len -= i;
616df8bae1dSRodney W. Grimes 			q->ip_off += i;
617df8bae1dSRodney W. Grimes 			m_adj(dtom(q), i);
618df8bae1dSRodney W. Grimes 			break;
619df8bae1dSRodney W. Grimes 		}
620e7c81944SDavid Greenman 		m0 = dtom(q);
621df8bae1dSRodney W. Grimes 		q = q->ipf_next;
622df8bae1dSRodney W. Grimes 		ip_deq(q->ipf_prev);
623e7c81944SDavid Greenman 		m_freem(m0);
624df8bae1dSRodney W. Grimes 	}
625df8bae1dSRodney W. Grimes 
626df8bae1dSRodney W. Grimes insert:
62793e0e116SJulian Elischer 
62893e0e116SJulian Elischer #ifdef IPDIVERT
62993e0e116SJulian Elischer 	/*
63093e0e116SJulian Elischer 	 * Any fragment diverting causes the whole packet to divert
63193e0e116SJulian Elischer 	 */
63293e0e116SJulian Elischer 	if (frag_divert_port != 0)
63393e0e116SJulian Elischer 		fp->ipq_divert = frag_divert_port;
63493e0e116SJulian Elischer 	frag_divert_port = 0;
63593e0e116SJulian Elischer #endif
63693e0e116SJulian Elischer 
637df8bae1dSRodney W. Grimes 	/*
638df8bae1dSRodney W. Grimes 	 * Stick new segment in its place;
639df8bae1dSRodney W. Grimes 	 * check for complete reassembly.
640df8bae1dSRodney W. Grimes 	 */
641df8bae1dSRodney W. Grimes 	ip_enq(ip, q->ipf_prev);
642df8bae1dSRodney W. Grimes 	next = 0;
643df8bae1dSRodney W. Grimes 	for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next) {
644df8bae1dSRodney W. Grimes 		if (q->ip_off != next)
645df8bae1dSRodney W. Grimes 			return (0);
646df8bae1dSRodney W. Grimes 		next += q->ip_len;
647df8bae1dSRodney W. Grimes 	}
648df8bae1dSRodney W. Grimes 	if (q->ipf_prev->ipf_mff & 1)
649df8bae1dSRodney W. Grimes 		return (0);
650df8bae1dSRodney W. Grimes 
651df8bae1dSRodney W. Grimes 	/*
652430d30d8SBill Fenner 	 * Reassembly is complete.  Make sure the packet is a sane size.
653430d30d8SBill Fenner 	 */
654430d30d8SBill Fenner 	if (next + (IP_VHL_HL(((struct ip *)fp->ipq_next)->ip_vhl) << 2)
655430d30d8SBill Fenner 							> IP_MAXPACKET) {
656430d30d8SBill Fenner 		ipstat.ips_toolong++;
657430d30d8SBill Fenner 		ip_freef(fp);
658430d30d8SBill Fenner 		return (0);
659430d30d8SBill Fenner 	}
660430d30d8SBill Fenner 
661430d30d8SBill Fenner 	/*
662430d30d8SBill Fenner 	 * Concatenate fragments.
663df8bae1dSRodney W. Grimes 	 */
664df8bae1dSRodney W. Grimes 	q = fp->ipq_next;
665df8bae1dSRodney W. Grimes 	m = dtom(q);
666df8bae1dSRodney W. Grimes 	t = m->m_next;
667df8bae1dSRodney W. Grimes 	m->m_next = 0;
668df8bae1dSRodney W. Grimes 	m_cat(m, t);
669df8bae1dSRodney W. Grimes 	q = q->ipf_next;
670df8bae1dSRodney W. Grimes 	while (q != (struct ipasfrag *)fp) {
671df8bae1dSRodney W. Grimes 		t = dtom(q);
672df8bae1dSRodney W. Grimes 		q = q->ipf_next;
673df8bae1dSRodney W. Grimes 		m_cat(m, t);
674df8bae1dSRodney W. Grimes 	}
675df8bae1dSRodney W. Grimes 
67693e0e116SJulian Elischer #ifdef IPDIVERT
67793e0e116SJulian Elischer 	/*
67893e0e116SJulian Elischer 	 * Record divert port for packet, if any
67993e0e116SJulian Elischer 	 */
68093e0e116SJulian Elischer 	frag_divert_port = fp->ipq_divert;
68193e0e116SJulian Elischer #endif
68293e0e116SJulian Elischer 
683df8bae1dSRodney W. Grimes 	/*
684df8bae1dSRodney W. Grimes 	 * Create header for new ip packet by
685df8bae1dSRodney W. Grimes 	 * modifying header of first packet;
686df8bae1dSRodney W. Grimes 	 * dequeue and discard fragment reassembly header.
687df8bae1dSRodney W. Grimes 	 * Make header visible.
688df8bae1dSRodney W. Grimes 	 */
689df8bae1dSRodney W. Grimes 	ip = fp->ipq_next;
690df8bae1dSRodney W. Grimes 	ip->ip_len = next;
691df8bae1dSRodney W. Grimes 	ip->ipf_mff &= ~1;
692df8bae1dSRodney W. Grimes 	((struct ip *)ip)->ip_src = fp->ipq_src;
693df8bae1dSRodney W. Grimes 	((struct ip *)ip)->ip_dst = fp->ipq_dst;
694df8bae1dSRodney W. Grimes 	remque(fp);
695df8bae1dSRodney W. Grimes 	(void) m_free(dtom(fp));
696df8bae1dSRodney W. Grimes 	m = dtom(ip);
697df8bae1dSRodney W. Grimes 	m->m_len += (ip->ip_hl << 2);
698df8bae1dSRodney W. Grimes 	m->m_data -= (ip->ip_hl << 2);
699df8bae1dSRodney W. Grimes 	/* some debugging cruft by sklower, below, will go away soon */
700df8bae1dSRodney W. Grimes 	if (m->m_flags & M_PKTHDR) { /* XXX this should be done elsewhere */
701df8bae1dSRodney W. Grimes 		register int plen = 0;
702df8bae1dSRodney W. Grimes 		for (t = m; m; m = m->m_next)
703df8bae1dSRodney W. Grimes 			plen += m->m_len;
704df8bae1dSRodney W. Grimes 		t->m_pkthdr.len = plen;
705df8bae1dSRodney W. Grimes 	}
706df8bae1dSRodney W. Grimes 	return ((struct ip *)ip);
707df8bae1dSRodney W. Grimes 
708df8bae1dSRodney W. Grimes dropfrag:
709df8bae1dSRodney W. Grimes 	ipstat.ips_fragdropped++;
710df8bae1dSRodney W. Grimes 	m_freem(m);
711df8bae1dSRodney W. Grimes 	return (0);
712df8bae1dSRodney W. Grimes }
713df8bae1dSRodney W. Grimes 
714df8bae1dSRodney W. Grimes /*
715df8bae1dSRodney W. Grimes  * Free a fragment reassembly header and all
716df8bae1dSRodney W. Grimes  * associated datagrams.
717df8bae1dSRodney W. Grimes  */
7180312fbe9SPoul-Henning Kamp static void
719df8bae1dSRodney W. Grimes ip_freef(fp)
720df8bae1dSRodney W. Grimes 	struct ipq *fp;
721df8bae1dSRodney W. Grimes {
722df8bae1dSRodney W. Grimes 	register struct ipasfrag *q, *p;
723df8bae1dSRodney W. Grimes 
724df8bae1dSRodney W. Grimes 	for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = p) {
725df8bae1dSRodney W. Grimes 		p = q->ipf_next;
726df8bae1dSRodney W. Grimes 		ip_deq(q);
727df8bae1dSRodney W. Grimes 		m_freem(dtom(q));
728df8bae1dSRodney W. Grimes 	}
729df8bae1dSRodney W. Grimes 	remque(fp);
730df8bae1dSRodney W. Grimes 	(void) m_free(dtom(fp));
731df8bae1dSRodney W. Grimes }
732df8bae1dSRodney W. Grimes 
733df8bae1dSRodney W. Grimes /*
734df8bae1dSRodney W. Grimes  * Put an ip fragment on a reassembly chain.
735df8bae1dSRodney W. Grimes  * Like insque, but pointers in middle of structure.
736df8bae1dSRodney W. Grimes  */
7370312fbe9SPoul-Henning Kamp static void
738df8bae1dSRodney W. Grimes ip_enq(p, prev)
739df8bae1dSRodney W. Grimes 	register struct ipasfrag *p, *prev;
740df8bae1dSRodney W. Grimes {
741df8bae1dSRodney W. Grimes 
742df8bae1dSRodney W. Grimes 	p->ipf_prev = prev;
743df8bae1dSRodney W. Grimes 	p->ipf_next = prev->ipf_next;
744df8bae1dSRodney W. Grimes 	prev->ipf_next->ipf_prev = p;
745df8bae1dSRodney W. Grimes 	prev->ipf_next = p;
746df8bae1dSRodney W. Grimes }
747df8bae1dSRodney W. Grimes 
748df8bae1dSRodney W. Grimes /*
749df8bae1dSRodney W. Grimes  * To ip_enq as remque is to insque.
750df8bae1dSRodney W. Grimes  */
7510312fbe9SPoul-Henning Kamp static void
752df8bae1dSRodney W. Grimes ip_deq(p)
753df8bae1dSRodney W. Grimes 	register struct ipasfrag *p;
754df8bae1dSRodney W. Grimes {
755df8bae1dSRodney W. Grimes 
756df8bae1dSRodney W. Grimes 	p->ipf_prev->ipf_next = p->ipf_next;
757df8bae1dSRodney W. Grimes 	p->ipf_next->ipf_prev = p->ipf_prev;
758df8bae1dSRodney W. Grimes }
759df8bae1dSRodney W. Grimes 
760df8bae1dSRodney W. Grimes /*
761df8bae1dSRodney W. Grimes  * IP timer processing;
762df8bae1dSRodney W. Grimes  * if a timer expires on a reassembly
763df8bae1dSRodney W. Grimes  * queue, discard it.
764df8bae1dSRodney W. Grimes  */
765df8bae1dSRodney W. Grimes void
766df8bae1dSRodney W. Grimes ip_slowtimo()
767df8bae1dSRodney W. Grimes {
768df8bae1dSRodney W. Grimes 	register struct ipq *fp;
769df8bae1dSRodney W. Grimes 	int s = splnet();
770df8bae1dSRodney W. Grimes 
771df8bae1dSRodney W. Grimes 	fp = ipq.next;
772df8bae1dSRodney W. Grimes 	if (fp == 0) {
773df8bae1dSRodney W. Grimes 		splx(s);
774df8bae1dSRodney W. Grimes 		return;
775df8bae1dSRodney W. Grimes 	}
776df8bae1dSRodney W. Grimes 	while (fp != &ipq) {
777df8bae1dSRodney W. Grimes 		--fp->ipq_ttl;
778df8bae1dSRodney W. Grimes 		fp = fp->next;
779df8bae1dSRodney W. Grimes 		if (fp->prev->ipq_ttl == 0) {
780df8bae1dSRodney W. Grimes 			ipstat.ips_fragtimeout++;
781df8bae1dSRodney W. Grimes 			ip_freef(fp->prev);
782df8bae1dSRodney W. Grimes 		}
783df8bae1dSRodney W. Grimes 	}
784df8bae1dSRodney W. Grimes 	splx(s);
785df8bae1dSRodney W. Grimes }
786df8bae1dSRodney W. Grimes 
787df8bae1dSRodney W. Grimes /*
788df8bae1dSRodney W. Grimes  * Drain off all datagram fragments.
789df8bae1dSRodney W. Grimes  */
790df8bae1dSRodney W. Grimes void
791df8bae1dSRodney W. Grimes ip_drain()
792df8bae1dSRodney W. Grimes {
793df8bae1dSRodney W. Grimes 	while (ipq.next != &ipq) {
794df8bae1dSRodney W. Grimes 		ipstat.ips_fragdropped++;
795df8bae1dSRodney W. Grimes 		ip_freef(ipq.next);
796df8bae1dSRodney W. Grimes 	}
797ce29ab3aSGarrett Wollman 
798ce29ab3aSGarrett Wollman 	in_rtqdrain();
799df8bae1dSRodney W. Grimes }
800df8bae1dSRodney W. Grimes 
801df8bae1dSRodney W. Grimes /*
802df8bae1dSRodney W. Grimes  * Do option processing on a datagram,
803df8bae1dSRodney W. Grimes  * possibly discarding it if bad options are encountered,
804df8bae1dSRodney W. Grimes  * or forwarding it if source-routed.
805df8bae1dSRodney W. Grimes  * Returns 1 if packet has been forwarded/freed,
806df8bae1dSRodney W. Grimes  * 0 if the packet should be processed further.
807df8bae1dSRodney W. Grimes  */
8080312fbe9SPoul-Henning Kamp static int
809df8bae1dSRodney W. Grimes ip_dooptions(m)
810df8bae1dSRodney W. Grimes 	struct mbuf *m;
811df8bae1dSRodney W. Grimes {
812df8bae1dSRodney W. Grimes 	register struct ip *ip = mtod(m, struct ip *);
813df8bae1dSRodney W. Grimes 	register u_char *cp;
814df8bae1dSRodney W. Grimes 	register struct ip_timestamp *ipt;
815df8bae1dSRodney W. Grimes 	register struct in_ifaddr *ia;
816df8bae1dSRodney W. Grimes 	int opt, optlen, cnt, off, code, type = ICMP_PARAMPROB, forward = 0;
817df8bae1dSRodney W. Grimes 	struct in_addr *sin, dst;
818df8bae1dSRodney W. Grimes 	n_time ntime;
819df8bae1dSRodney W. Grimes 
820df8bae1dSRodney W. Grimes 	dst = ip->ip_dst;
821df8bae1dSRodney W. Grimes 	cp = (u_char *)(ip + 1);
82258938916SGarrett Wollman 	cnt = (IP_VHL_HL(ip->ip_vhl) << 2) - sizeof (struct ip);
823df8bae1dSRodney W. Grimes 	for (; cnt > 0; cnt -= optlen, cp += optlen) {
824df8bae1dSRodney W. Grimes 		opt = cp[IPOPT_OPTVAL];
825df8bae1dSRodney W. Grimes 		if (opt == IPOPT_EOL)
826df8bae1dSRodney W. Grimes 			break;
827df8bae1dSRodney W. Grimes 		if (opt == IPOPT_NOP)
828df8bae1dSRodney W. Grimes 			optlen = 1;
829df8bae1dSRodney W. Grimes 		else {
830df8bae1dSRodney W. Grimes 			optlen = cp[IPOPT_OLEN];
831df8bae1dSRodney W. Grimes 			if (optlen <= 0 || optlen > cnt) {
832df8bae1dSRodney W. Grimes 				code = &cp[IPOPT_OLEN] - (u_char *)ip;
833df8bae1dSRodney W. Grimes 				goto bad;
834df8bae1dSRodney W. Grimes 			}
835df8bae1dSRodney W. Grimes 		}
836df8bae1dSRodney W. Grimes 		switch (opt) {
837df8bae1dSRodney W. Grimes 
838df8bae1dSRodney W. Grimes 		default:
839df8bae1dSRodney W. Grimes 			break;
840df8bae1dSRodney W. Grimes 
841df8bae1dSRodney W. Grimes 		/*
842df8bae1dSRodney W. Grimes 		 * Source routing with record.
843df8bae1dSRodney W. Grimes 		 * Find interface with current destination address.
844df8bae1dSRodney W. Grimes 		 * If none on this machine then drop if strictly routed,
845df8bae1dSRodney W. Grimes 		 * or do nothing if loosely routed.
846df8bae1dSRodney W. Grimes 		 * Record interface address and bring up next address
847df8bae1dSRodney W. Grimes 		 * component.  If strictly routed make sure next
848df8bae1dSRodney W. Grimes 		 * address is on directly accessible net.
849df8bae1dSRodney W. Grimes 		 */
850df8bae1dSRodney W. Grimes 		case IPOPT_LSRR:
851df8bae1dSRodney W. Grimes 		case IPOPT_SSRR:
852df8bae1dSRodney W. Grimes 			if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) {
853df8bae1dSRodney W. Grimes 				code = &cp[IPOPT_OFFSET] - (u_char *)ip;
854df8bae1dSRodney W. Grimes 				goto bad;
855df8bae1dSRodney W. Grimes 			}
856df8bae1dSRodney W. Grimes 			ipaddr.sin_addr = ip->ip_dst;
857df8bae1dSRodney W. Grimes 			ia = (struct in_ifaddr *)
858df8bae1dSRodney W. Grimes 				ifa_ifwithaddr((struct sockaddr *)&ipaddr);
859df8bae1dSRodney W. Grimes 			if (ia == 0) {
860df8bae1dSRodney W. Grimes 				if (opt == IPOPT_SSRR) {
861df8bae1dSRodney W. Grimes 					type = ICMP_UNREACH;
862df8bae1dSRodney W. Grimes 					code = ICMP_UNREACH_SRCFAIL;
863df8bae1dSRodney W. Grimes 					goto bad;
864df8bae1dSRodney W. Grimes 				}
865df8bae1dSRodney W. Grimes 				/*
866df8bae1dSRodney W. Grimes 				 * Loose routing, and not at next destination
867df8bae1dSRodney W. Grimes 				 * yet; nothing to do except forward.
868df8bae1dSRodney W. Grimes 				 */
869df8bae1dSRodney W. Grimes 				break;
870df8bae1dSRodney W. Grimes 			}
871df8bae1dSRodney W. Grimes 			off--;			/* 0 origin */
872df8bae1dSRodney W. Grimes 			if (off > optlen - sizeof(struct in_addr)) {
873df8bae1dSRodney W. Grimes 				/*
874df8bae1dSRodney W. Grimes 				 * End of source route.  Should be for us.
875df8bae1dSRodney W. Grimes 				 */
876df8bae1dSRodney W. Grimes 				save_rte(cp, ip->ip_src);
877df8bae1dSRodney W. Grimes 				break;
878df8bae1dSRodney W. Grimes 			}
8791025071fSGarrett Wollman 
8801025071fSGarrett Wollman 			if (!ip_dosourceroute) {
8811025071fSGarrett Wollman 				char buf[4*sizeof "123"];
8821025071fSGarrett Wollman 				strcpy(buf, inet_ntoa(ip->ip_dst));
8831025071fSGarrett Wollman 
8841025071fSGarrett Wollman 				log(LOG_WARNING,
8851025071fSGarrett Wollman 				    "attempted source route from %s to %s\n",
8861025071fSGarrett Wollman 				    inet_ntoa(ip->ip_src), buf);
8871025071fSGarrett Wollman 				type = ICMP_UNREACH;
8881025071fSGarrett Wollman 				code = ICMP_UNREACH_SRCFAIL;
8891025071fSGarrett Wollman 				goto bad;
8901025071fSGarrett Wollman 			}
8911025071fSGarrett Wollman 
892df8bae1dSRodney W. Grimes 			/*
893df8bae1dSRodney W. Grimes 			 * locate outgoing interface
894df8bae1dSRodney W. Grimes 			 */
89594a5d9b6SDavid Greenman 			(void)memcpy(&ipaddr.sin_addr, cp + off,
896df8bae1dSRodney W. Grimes 			    sizeof(ipaddr.sin_addr));
8971025071fSGarrett Wollman 
898df8bae1dSRodney W. Grimes 			if (opt == IPOPT_SSRR) {
899df8bae1dSRodney W. Grimes #define	INA	struct in_ifaddr *
900df8bae1dSRodney W. Grimes #define	SA	struct sockaddr *
901df8bae1dSRodney W. Grimes 			    if ((ia = (INA)ifa_ifwithdstaddr((SA)&ipaddr)) == 0)
902df8bae1dSRodney W. Grimes 				ia = (INA)ifa_ifwithnet((SA)&ipaddr);
903df8bae1dSRodney W. Grimes 			} else
904df8bae1dSRodney W. Grimes 				ia = ip_rtaddr(ipaddr.sin_addr);
905df8bae1dSRodney W. Grimes 			if (ia == 0) {
906df8bae1dSRodney W. Grimes 				type = ICMP_UNREACH;
907df8bae1dSRodney W. Grimes 				code = ICMP_UNREACH_SRCFAIL;
908df8bae1dSRodney W. Grimes 				goto bad;
909df8bae1dSRodney W. Grimes 			}
910df8bae1dSRodney W. Grimes 			ip->ip_dst = ipaddr.sin_addr;
91194a5d9b6SDavid Greenman 			(void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr),
91294a5d9b6SDavid Greenman 			    sizeof(struct in_addr));
913df8bae1dSRodney W. Grimes 			cp[IPOPT_OFFSET] += sizeof(struct in_addr);
914df8bae1dSRodney W. Grimes 			/*
915df8bae1dSRodney W. Grimes 			 * Let ip_intr's mcast routing check handle mcast pkts
916df8bae1dSRodney W. Grimes 			 */
917df8bae1dSRodney W. Grimes 			forward = !IN_MULTICAST(ntohl(ip->ip_dst.s_addr));
918df8bae1dSRodney W. Grimes 			break;
919df8bae1dSRodney W. Grimes 
920df8bae1dSRodney W. Grimes 		case IPOPT_RR:
921df8bae1dSRodney W. Grimes 			if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) {
922df8bae1dSRodney W. Grimes 				code = &cp[IPOPT_OFFSET] - (u_char *)ip;
923df8bae1dSRodney W. Grimes 				goto bad;
924df8bae1dSRodney W. Grimes 			}
925df8bae1dSRodney W. Grimes 			/*
926df8bae1dSRodney W. Grimes 			 * If no space remains, ignore.
927df8bae1dSRodney W. Grimes 			 */
928df8bae1dSRodney W. Grimes 			off--;			/* 0 origin */
929df8bae1dSRodney W. Grimes 			if (off > optlen - sizeof(struct in_addr))
930df8bae1dSRodney W. Grimes 				break;
93194a5d9b6SDavid Greenman 			(void)memcpy(&ipaddr.sin_addr, &ip->ip_dst,
932df8bae1dSRodney W. Grimes 			    sizeof(ipaddr.sin_addr));
933df8bae1dSRodney W. Grimes 			/*
934df8bae1dSRodney W. Grimes 			 * locate outgoing interface; if we're the destination,
935df8bae1dSRodney W. Grimes 			 * use the incoming interface (should be same).
936df8bae1dSRodney W. Grimes 			 */
937df8bae1dSRodney W. Grimes 			if ((ia = (INA)ifa_ifwithaddr((SA)&ipaddr)) == 0 &&
938df8bae1dSRodney W. Grimes 			    (ia = ip_rtaddr(ipaddr.sin_addr)) == 0) {
939df8bae1dSRodney W. Grimes 				type = ICMP_UNREACH;
940df8bae1dSRodney W. Grimes 				code = ICMP_UNREACH_HOST;
941df8bae1dSRodney W. Grimes 				goto bad;
942df8bae1dSRodney W. Grimes 			}
94394a5d9b6SDavid Greenman 			(void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr),
94494a5d9b6SDavid Greenman 			    sizeof(struct in_addr));
945df8bae1dSRodney W. Grimes 			cp[IPOPT_OFFSET] += sizeof(struct in_addr);
946df8bae1dSRodney W. Grimes 			break;
947df8bae1dSRodney W. Grimes 
948df8bae1dSRodney W. Grimes 		case IPOPT_TS:
949df8bae1dSRodney W. Grimes 			code = cp - (u_char *)ip;
950df8bae1dSRodney W. Grimes 			ipt = (struct ip_timestamp *)cp;
951df8bae1dSRodney W. Grimes 			if (ipt->ipt_len < 5)
952df8bae1dSRodney W. Grimes 				goto bad;
953df8bae1dSRodney W. Grimes 			if (ipt->ipt_ptr > ipt->ipt_len - sizeof (long)) {
954df8bae1dSRodney W. Grimes 				if (++ipt->ipt_oflw == 0)
955df8bae1dSRodney W. Grimes 					goto bad;
956df8bae1dSRodney W. Grimes 				break;
957df8bae1dSRodney W. Grimes 			}
958df8bae1dSRodney W. Grimes 			sin = (struct in_addr *)(cp + ipt->ipt_ptr - 1);
959df8bae1dSRodney W. Grimes 			switch (ipt->ipt_flg) {
960df8bae1dSRodney W. Grimes 
961df8bae1dSRodney W. Grimes 			case IPOPT_TS_TSONLY:
962df8bae1dSRodney W. Grimes 				break;
963df8bae1dSRodney W. Grimes 
964df8bae1dSRodney W. Grimes 			case IPOPT_TS_TSANDADDR:
965df8bae1dSRodney W. Grimes 				if (ipt->ipt_ptr + sizeof(n_time) +
966df8bae1dSRodney W. Grimes 				    sizeof(struct in_addr) > ipt->ipt_len)
967df8bae1dSRodney W. Grimes 					goto bad;
968df8bae1dSRodney W. Grimes 				ipaddr.sin_addr = dst;
969df8bae1dSRodney W. Grimes 				ia = (INA)ifaof_ifpforaddr((SA)&ipaddr,
970df8bae1dSRodney W. Grimes 							    m->m_pkthdr.rcvif);
971df8bae1dSRodney W. Grimes 				if (ia == 0)
972df8bae1dSRodney W. Grimes 					continue;
97394a5d9b6SDavid Greenman 				(void)memcpy(sin, &IA_SIN(ia)->sin_addr,
97494a5d9b6SDavid Greenman 				    sizeof(struct in_addr));
975df8bae1dSRodney W. Grimes 				ipt->ipt_ptr += sizeof(struct in_addr);
976df8bae1dSRodney W. Grimes 				break;
977df8bae1dSRodney W. Grimes 
978df8bae1dSRodney W. Grimes 			case IPOPT_TS_PRESPEC:
979df8bae1dSRodney W. Grimes 				if (ipt->ipt_ptr + sizeof(n_time) +
980df8bae1dSRodney W. Grimes 				    sizeof(struct in_addr) > ipt->ipt_len)
981df8bae1dSRodney W. Grimes 					goto bad;
98294a5d9b6SDavid Greenman 				(void)memcpy(&ipaddr.sin_addr, sin,
983df8bae1dSRodney W. Grimes 				    sizeof(struct in_addr));
984df8bae1dSRodney W. Grimes 				if (ifa_ifwithaddr((SA)&ipaddr) == 0)
985df8bae1dSRodney W. Grimes 					continue;
986df8bae1dSRodney W. Grimes 				ipt->ipt_ptr += sizeof(struct in_addr);
987df8bae1dSRodney W. Grimes 				break;
988df8bae1dSRodney W. Grimes 
989df8bae1dSRodney W. Grimes 			default:
990df8bae1dSRodney W. Grimes 				goto bad;
991df8bae1dSRodney W. Grimes 			}
992df8bae1dSRodney W. Grimes 			ntime = iptime();
99394a5d9b6SDavid Greenman 			(void)memcpy(cp + ipt->ipt_ptr - 1, &ntime,
994df8bae1dSRodney W. Grimes 			    sizeof(n_time));
995df8bae1dSRodney W. Grimes 			ipt->ipt_ptr += sizeof(n_time);
996df8bae1dSRodney W. Grimes 		}
997df8bae1dSRodney W. Grimes 	}
998df8bae1dSRodney W. Grimes 	if (forward) {
999df8bae1dSRodney W. Grimes 		ip_forward(m, 1);
1000df8bae1dSRodney W. Grimes 		return (1);
1001df8bae1dSRodney W. Grimes 	}
1002df8bae1dSRodney W. Grimes 	return (0);
1003df8bae1dSRodney W. Grimes bad:
100458938916SGarrett Wollman 	ip->ip_len -= IP_VHL_HL(ip->ip_vhl) << 2;   /* XXX icmp_error adds in hdr length */
1005df8bae1dSRodney W. Grimes 	icmp_error(m, type, code, 0, 0);
1006df8bae1dSRodney W. Grimes 	ipstat.ips_badoptions++;
1007df8bae1dSRodney W. Grimes 	return (1);
1008df8bae1dSRodney W. Grimes }
1009df8bae1dSRodney W. Grimes 
1010df8bae1dSRodney W. Grimes /*
1011df8bae1dSRodney W. Grimes  * Given address of next destination (final or next hop),
1012df8bae1dSRodney W. Grimes  * return internet address info of interface to be used to get there.
1013df8bae1dSRodney W. Grimes  */
10140312fbe9SPoul-Henning Kamp static struct in_ifaddr *
1015df8bae1dSRodney W. Grimes ip_rtaddr(dst)
1016df8bae1dSRodney W. Grimes 	 struct in_addr dst;
1017df8bae1dSRodney W. Grimes {
1018df8bae1dSRodney W. Grimes 	register struct sockaddr_in *sin;
1019df8bae1dSRodney W. Grimes 
1020df8bae1dSRodney W. Grimes 	sin = (struct sockaddr_in *) &ipforward_rt.ro_dst;
1021df8bae1dSRodney W. Grimes 
1022df8bae1dSRodney W. Grimes 	if (ipforward_rt.ro_rt == 0 || dst.s_addr != sin->sin_addr.s_addr) {
1023df8bae1dSRodney W. Grimes 		if (ipforward_rt.ro_rt) {
1024df8bae1dSRodney W. Grimes 			RTFREE(ipforward_rt.ro_rt);
1025df8bae1dSRodney W. Grimes 			ipforward_rt.ro_rt = 0;
1026df8bae1dSRodney W. Grimes 		}
1027df8bae1dSRodney W. Grimes 		sin->sin_family = AF_INET;
1028df8bae1dSRodney W. Grimes 		sin->sin_len = sizeof(*sin);
1029df8bae1dSRodney W. Grimes 		sin->sin_addr = dst;
1030df8bae1dSRodney W. Grimes 
10312c17fe93SGarrett Wollman 		rtalloc_ign(&ipforward_rt, RTF_PRCLONING);
1032df8bae1dSRodney W. Grimes 	}
1033df8bae1dSRodney W. Grimes 	if (ipforward_rt.ro_rt == 0)
1034df8bae1dSRodney W. Grimes 		return ((struct in_ifaddr *)0);
1035df8bae1dSRodney W. Grimes 	return ((struct in_ifaddr *) ipforward_rt.ro_rt->rt_ifa);
1036df8bae1dSRodney W. Grimes }
1037df8bae1dSRodney W. Grimes 
1038df8bae1dSRodney W. Grimes /*
1039df8bae1dSRodney W. Grimes  * Save incoming source route for use in replies,
1040df8bae1dSRodney W. Grimes  * to be picked up later by ip_srcroute if the receiver is interested.
1041df8bae1dSRodney W. Grimes  */
1042df8bae1dSRodney W. Grimes void
1043df8bae1dSRodney W. Grimes save_rte(option, dst)
1044df8bae1dSRodney W. Grimes 	u_char *option;
1045df8bae1dSRodney W. Grimes 	struct in_addr dst;
1046df8bae1dSRodney W. Grimes {
1047df8bae1dSRodney W. Grimes 	unsigned olen;
1048df8bae1dSRodney W. Grimes 
1049df8bae1dSRodney W. Grimes 	olen = option[IPOPT_OLEN];
1050df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1051df8bae1dSRodney W. Grimes 	if (ipprintfs)
1052df8bae1dSRodney W. Grimes 		printf("save_rte: olen %d\n", olen);
1053df8bae1dSRodney W. Grimes #endif
1054df8bae1dSRodney W. Grimes 	if (olen > sizeof(ip_srcrt) - (1 + sizeof(dst)))
1055df8bae1dSRodney W. Grimes 		return;
10560453d3cbSBruce Evans 	bcopy(option, ip_srcrt.srcopt, olen);
1057df8bae1dSRodney W. Grimes 	ip_nhops = (olen - IPOPT_OFFSET - 1) / sizeof(struct in_addr);
1058df8bae1dSRodney W. Grimes 	ip_srcrt.dst = dst;
1059df8bae1dSRodney W. Grimes }
1060df8bae1dSRodney W. Grimes 
1061df8bae1dSRodney W. Grimes /*
1062df8bae1dSRodney W. Grimes  * Retrieve incoming source route for use in replies,
1063df8bae1dSRodney W. Grimes  * in the same form used by setsockopt.
1064df8bae1dSRodney W. Grimes  * The first hop is placed before the options, will be removed later.
1065df8bae1dSRodney W. Grimes  */
1066df8bae1dSRodney W. Grimes struct mbuf *
1067df8bae1dSRodney W. Grimes ip_srcroute()
1068df8bae1dSRodney W. Grimes {
1069df8bae1dSRodney W. Grimes 	register struct in_addr *p, *q;
1070df8bae1dSRodney W. Grimes 	register struct mbuf *m;
1071df8bae1dSRodney W. Grimes 
1072df8bae1dSRodney W. Grimes 	if (ip_nhops == 0)
1073df8bae1dSRodney W. Grimes 		return ((struct mbuf *)0);
1074df8bae1dSRodney W. Grimes 	m = m_get(M_DONTWAIT, MT_SOOPTS);
1075df8bae1dSRodney W. Grimes 	if (m == 0)
1076df8bae1dSRodney W. Grimes 		return ((struct mbuf *)0);
1077df8bae1dSRodney W. Grimes 
1078df8bae1dSRodney W. Grimes #define OPTSIZ	(sizeof(ip_srcrt.nop) + sizeof(ip_srcrt.srcopt))
1079df8bae1dSRodney W. Grimes 
1080df8bae1dSRodney W. Grimes 	/* length is (nhops+1)*sizeof(addr) + sizeof(nop + srcrt header) */
1081df8bae1dSRodney W. Grimes 	m->m_len = ip_nhops * sizeof(struct in_addr) + sizeof(struct in_addr) +
1082df8bae1dSRodney W. Grimes 	    OPTSIZ;
1083df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1084df8bae1dSRodney W. Grimes 	if (ipprintfs)
1085df8bae1dSRodney W. Grimes 		printf("ip_srcroute: nhops %d mlen %d", ip_nhops, m->m_len);
1086df8bae1dSRodney W. Grimes #endif
1087df8bae1dSRodney W. Grimes 
1088df8bae1dSRodney W. Grimes 	/*
1089df8bae1dSRodney W. Grimes 	 * First save first hop for return route
1090df8bae1dSRodney W. Grimes 	 */
1091df8bae1dSRodney W. Grimes 	p = &ip_srcrt.route[ip_nhops - 1];
1092df8bae1dSRodney W. Grimes 	*(mtod(m, struct in_addr *)) = *p--;
1093df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1094df8bae1dSRodney W. Grimes 	if (ipprintfs)
1095df8bae1dSRodney W. Grimes 		printf(" hops %lx", ntohl(mtod(m, struct in_addr *)->s_addr));
1096df8bae1dSRodney W. Grimes #endif
1097df8bae1dSRodney W. Grimes 
1098df8bae1dSRodney W. Grimes 	/*
1099df8bae1dSRodney W. Grimes 	 * Copy option fields and padding (nop) to mbuf.
1100df8bae1dSRodney W. Grimes 	 */
1101df8bae1dSRodney W. Grimes 	ip_srcrt.nop = IPOPT_NOP;
1102df8bae1dSRodney W. Grimes 	ip_srcrt.srcopt[IPOPT_OFFSET] = IPOPT_MINOFF;
110394a5d9b6SDavid Greenman 	(void)memcpy(mtod(m, caddr_t) + sizeof(struct in_addr),
110494a5d9b6SDavid Greenman 	    &ip_srcrt.nop, OPTSIZ);
1105df8bae1dSRodney W. Grimes 	q = (struct in_addr *)(mtod(m, caddr_t) +
1106df8bae1dSRodney W. Grimes 	    sizeof(struct in_addr) + OPTSIZ);
1107df8bae1dSRodney W. Grimes #undef OPTSIZ
1108df8bae1dSRodney W. Grimes 	/*
1109df8bae1dSRodney W. Grimes 	 * Record return path as an IP source route,
1110df8bae1dSRodney W. Grimes 	 * reversing the path (pointers are now aligned).
1111df8bae1dSRodney W. Grimes 	 */
1112df8bae1dSRodney W. Grimes 	while (p >= ip_srcrt.route) {
1113df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1114df8bae1dSRodney W. Grimes 		if (ipprintfs)
1115df8bae1dSRodney W. Grimes 			printf(" %lx", ntohl(q->s_addr));
1116df8bae1dSRodney W. Grimes #endif
1117df8bae1dSRodney W. Grimes 		*q++ = *p--;
1118df8bae1dSRodney W. Grimes 	}
1119df8bae1dSRodney W. Grimes 	/*
1120df8bae1dSRodney W. Grimes 	 * Last hop goes to final destination.
1121df8bae1dSRodney W. Grimes 	 */
1122df8bae1dSRodney W. Grimes 	*q = ip_srcrt.dst;
1123df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1124df8bae1dSRodney W. Grimes 	if (ipprintfs)
1125df8bae1dSRodney W. Grimes 		printf(" %lx\n", ntohl(q->s_addr));
1126df8bae1dSRodney W. Grimes #endif
1127df8bae1dSRodney W. Grimes 	return (m);
1128df8bae1dSRodney W. Grimes }
1129df8bae1dSRodney W. Grimes 
1130df8bae1dSRodney W. Grimes /*
1131df8bae1dSRodney W. Grimes  * Strip out IP options, at higher
1132df8bae1dSRodney W. Grimes  * level protocol in the kernel.
1133df8bae1dSRodney W. Grimes  * Second argument is buffer to which options
1134df8bae1dSRodney W. Grimes  * will be moved, and return value is their length.
1135df8bae1dSRodney W. Grimes  * XXX should be deleted; last arg currently ignored.
1136df8bae1dSRodney W. Grimes  */
1137df8bae1dSRodney W. Grimes void
1138df8bae1dSRodney W. Grimes ip_stripoptions(m, mopt)
1139df8bae1dSRodney W. Grimes 	register struct mbuf *m;
1140df8bae1dSRodney W. Grimes 	struct mbuf *mopt;
1141df8bae1dSRodney W. Grimes {
1142df8bae1dSRodney W. Grimes 	register int i;
1143df8bae1dSRodney W. Grimes 	struct ip *ip = mtod(m, struct ip *);
1144df8bae1dSRodney W. Grimes 	register caddr_t opts;
1145df8bae1dSRodney W. Grimes 	int olen;
1146df8bae1dSRodney W. Grimes 
114758938916SGarrett Wollman 	olen = (IP_VHL_HL(ip->ip_vhl) << 2) - sizeof (struct ip);
1148df8bae1dSRodney W. Grimes 	opts = (caddr_t)(ip + 1);
1149df8bae1dSRodney W. Grimes 	i = m->m_len - (sizeof (struct ip) + olen);
1150df8bae1dSRodney W. Grimes 	bcopy(opts + olen, opts, (unsigned)i);
1151df8bae1dSRodney W. Grimes 	m->m_len -= olen;
1152df8bae1dSRodney W. Grimes 	if (m->m_flags & M_PKTHDR)
1153df8bae1dSRodney W. Grimes 		m->m_pkthdr.len -= olen;
115458938916SGarrett Wollman 	ip->ip_vhl = IP_MAKE_VHL(IPVERSION, sizeof(struct ip) >> 2);
1155df8bae1dSRodney W. Grimes }
1156df8bae1dSRodney W. Grimes 
1157df8bae1dSRodney W. Grimes u_char inetctlerrmap[PRC_NCMDS] = {
1158df8bae1dSRodney W. Grimes 	0,		0,		0,		0,
1159df8bae1dSRodney W. Grimes 	0,		EMSGSIZE,	EHOSTDOWN,	EHOSTUNREACH,
1160df8bae1dSRodney W. Grimes 	EHOSTUNREACH,	EHOSTUNREACH,	ECONNREFUSED,	ECONNREFUSED,
1161df8bae1dSRodney W. Grimes 	EMSGSIZE,	EHOSTUNREACH,	0,		0,
1162df8bae1dSRodney W. Grimes 	0,		0,		0,		0,
1163df8bae1dSRodney W. Grimes 	ENOPROTOOPT
1164df8bae1dSRodney W. Grimes };
1165df8bae1dSRodney W. Grimes 
1166df8bae1dSRodney W. Grimes /*
1167df8bae1dSRodney W. Grimes  * Forward a packet.  If some error occurs return the sender
1168df8bae1dSRodney W. Grimes  * an icmp packet.  Note we can't always generate a meaningful
1169df8bae1dSRodney W. Grimes  * icmp message because icmp doesn't have a large enough repertoire
1170df8bae1dSRodney W. Grimes  * of codes and types.
1171df8bae1dSRodney W. Grimes  *
1172df8bae1dSRodney W. Grimes  * If not forwarding, just drop the packet.  This could be confusing
1173df8bae1dSRodney W. Grimes  * if ipforwarding was zero but some routing protocol was advancing
1174df8bae1dSRodney W. Grimes  * us as a gateway to somewhere.  However, we must let the routing
1175df8bae1dSRodney W. Grimes  * protocol deal with that.
1176df8bae1dSRodney W. Grimes  *
1177df8bae1dSRodney W. Grimes  * The srcrt parameter indicates whether the packet is being forwarded
1178df8bae1dSRodney W. Grimes  * via a source route.
1179df8bae1dSRodney W. Grimes  */
11800312fbe9SPoul-Henning Kamp static void
1181df8bae1dSRodney W. Grimes ip_forward(m, srcrt)
1182df8bae1dSRodney W. Grimes 	struct mbuf *m;
1183df8bae1dSRodney W. Grimes 	int srcrt;
1184df8bae1dSRodney W. Grimes {
1185df8bae1dSRodney W. Grimes 	register struct ip *ip = mtod(m, struct ip *);
1186df8bae1dSRodney W. Grimes 	register struct sockaddr_in *sin;
1187df8bae1dSRodney W. Grimes 	register struct rtentry *rt;
118826f9a767SRodney W. Grimes 	int error, type = 0, code = 0;
1189df8bae1dSRodney W. Grimes 	struct mbuf *mcopy;
1190df8bae1dSRodney W. Grimes 	n_long dest;
1191df8bae1dSRodney W. Grimes 	struct ifnet *destifp;
1192df8bae1dSRodney W. Grimes 
1193df8bae1dSRodney W. Grimes 	dest = 0;
1194df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1195df8bae1dSRodney W. Grimes 	if (ipprintfs)
119661ce519bSPoul-Henning Kamp 		printf("forward: src %lx dst %lx ttl %x\n",
1197623ae52eSPoul-Henning Kamp 			ip->ip_src.s_addr, ip->ip_dst.s_addr, ip->ip_ttl);
1198df8bae1dSRodney W. Grimes #endif
1199100ba1a6SJordan K. Hubbard 
1200100ba1a6SJordan K. Hubbard 
1201df8bae1dSRodney W. Grimes 	if (m->m_flags & M_BCAST || in_canforward(ip->ip_dst) == 0) {
1202df8bae1dSRodney W. Grimes 		ipstat.ips_cantforward++;
1203df8bae1dSRodney W. Grimes 		m_freem(m);
1204df8bae1dSRodney W. Grimes 		return;
1205df8bae1dSRodney W. Grimes 	}
1206df8bae1dSRodney W. Grimes 	HTONS(ip->ip_id);
1207df8bae1dSRodney W. Grimes 	if (ip->ip_ttl <= IPTTLDEC) {
1208df8bae1dSRodney W. Grimes 		icmp_error(m, ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS, dest, 0);
1209df8bae1dSRodney W. Grimes 		return;
1210df8bae1dSRodney W. Grimes 	}
1211df8bae1dSRodney W. Grimes 	ip->ip_ttl -= IPTTLDEC;
1212df8bae1dSRodney W. Grimes 
1213df8bae1dSRodney W. Grimes 	sin = (struct sockaddr_in *)&ipforward_rt.ro_dst;
1214df8bae1dSRodney W. Grimes 	if ((rt = ipforward_rt.ro_rt) == 0 ||
1215df8bae1dSRodney W. Grimes 	    ip->ip_dst.s_addr != sin->sin_addr.s_addr) {
1216df8bae1dSRodney W. Grimes 		if (ipforward_rt.ro_rt) {
1217df8bae1dSRodney W. Grimes 			RTFREE(ipforward_rt.ro_rt);
1218df8bae1dSRodney W. Grimes 			ipforward_rt.ro_rt = 0;
1219df8bae1dSRodney W. Grimes 		}
1220df8bae1dSRodney W. Grimes 		sin->sin_family = AF_INET;
1221df8bae1dSRodney W. Grimes 		sin->sin_len = sizeof(*sin);
1222df8bae1dSRodney W. Grimes 		sin->sin_addr = ip->ip_dst;
1223df8bae1dSRodney W. Grimes 
12242c17fe93SGarrett Wollman 		rtalloc_ign(&ipforward_rt, RTF_PRCLONING);
1225df8bae1dSRodney W. Grimes 		if (ipforward_rt.ro_rt == 0) {
1226df8bae1dSRodney W. Grimes 			icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, dest, 0);
1227df8bae1dSRodney W. Grimes 			return;
1228df8bae1dSRodney W. Grimes 		}
1229df8bae1dSRodney W. Grimes 		rt = ipforward_rt.ro_rt;
1230df8bae1dSRodney W. Grimes 	}
1231df8bae1dSRodney W. Grimes 
1232df8bae1dSRodney W. Grimes 	/*
1233df8bae1dSRodney W. Grimes 	 * Save at most 64 bytes of the packet in case
1234df8bae1dSRodney W. Grimes 	 * we need to generate an ICMP message to the src.
1235df8bae1dSRodney W. Grimes 	 */
1236df8bae1dSRodney W. Grimes 	mcopy = m_copy(m, 0, imin((int)ip->ip_len, 64));
1237df8bae1dSRodney W. Grimes 
1238df8bae1dSRodney W. Grimes 	/*
1239df8bae1dSRodney W. Grimes 	 * If forwarding packet using same interface that it came in on,
1240df8bae1dSRodney W. Grimes 	 * perhaps should send a redirect to sender to shortcut a hop.
1241df8bae1dSRodney W. Grimes 	 * Only send redirect if source is sending directly to us,
1242df8bae1dSRodney W. Grimes 	 * and if packet was not source routed (or has any options).
1243df8bae1dSRodney W. Grimes 	 * Also, don't send redirect if forwarding using a default route
1244df8bae1dSRodney W. Grimes 	 * or a route modified by a redirect.
1245df8bae1dSRodney W. Grimes 	 */
1246df8bae1dSRodney W. Grimes #define	satosin(sa)	((struct sockaddr_in *)(sa))
1247df8bae1dSRodney W. Grimes 	if (rt->rt_ifp == m->m_pkthdr.rcvif &&
1248df8bae1dSRodney W. Grimes 	    (rt->rt_flags & (RTF_DYNAMIC|RTF_MODIFIED)) == 0 &&
1249df8bae1dSRodney W. Grimes 	    satosin(rt_key(rt))->sin_addr.s_addr != 0 &&
1250df8bae1dSRodney W. Grimes 	    ipsendredirects && !srcrt) {
1251df8bae1dSRodney W. Grimes #define	RTA(rt)	((struct in_ifaddr *)(rt->rt_ifa))
1252df8bae1dSRodney W. Grimes 		u_long src = ntohl(ip->ip_src.s_addr);
1253df8bae1dSRodney W. Grimes 
1254df8bae1dSRodney W. Grimes 		if (RTA(rt) &&
1255df8bae1dSRodney W. Grimes 		    (src & RTA(rt)->ia_subnetmask) == RTA(rt)->ia_subnet) {
1256df8bae1dSRodney W. Grimes 		    if (rt->rt_flags & RTF_GATEWAY)
1257df8bae1dSRodney W. Grimes 			dest = satosin(rt->rt_gateway)->sin_addr.s_addr;
1258df8bae1dSRodney W. Grimes 		    else
1259df8bae1dSRodney W. Grimes 			dest = ip->ip_dst.s_addr;
1260df8bae1dSRodney W. Grimes 		    /* Router requirements says to only send host redirects */
1261df8bae1dSRodney W. Grimes 		    type = ICMP_REDIRECT;
1262df8bae1dSRodney W. Grimes 		    code = ICMP_REDIRECT_HOST;
1263df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
1264df8bae1dSRodney W. Grimes 		    if (ipprintfs)
1265df8bae1dSRodney W. Grimes 		        printf("redirect (%d) to %lx\n", code, (u_long)dest);
1266df8bae1dSRodney W. Grimes #endif
1267df8bae1dSRodney W. Grimes 		}
1268df8bae1dSRodney W. Grimes 	}
1269df8bae1dSRodney W. Grimes 
1270b97d15cbSGarrett Wollman 	error = ip_output(m, (struct mbuf *)0, &ipforward_rt,
1271b97d15cbSGarrett Wollman 			  IP_FORWARDING, 0);
1272df8bae1dSRodney W. Grimes 	if (error)
1273df8bae1dSRodney W. Grimes 		ipstat.ips_cantforward++;
1274df8bae1dSRodney W. Grimes 	else {
1275df8bae1dSRodney W. Grimes 		ipstat.ips_forward++;
1276df8bae1dSRodney W. Grimes 		if (type)
1277df8bae1dSRodney W. Grimes 			ipstat.ips_redirectsent++;
1278df8bae1dSRodney W. Grimes 		else {
1279df8bae1dSRodney W. Grimes 			if (mcopy)
1280df8bae1dSRodney W. Grimes 				m_freem(mcopy);
1281df8bae1dSRodney W. Grimes 			return;
1282df8bae1dSRodney W. Grimes 		}
1283df8bae1dSRodney W. Grimes 	}
1284df8bae1dSRodney W. Grimes 	if (mcopy == NULL)
1285df8bae1dSRodney W. Grimes 		return;
1286df8bae1dSRodney W. Grimes 	destifp = NULL;
1287df8bae1dSRodney W. Grimes 
1288df8bae1dSRodney W. Grimes 	switch (error) {
1289df8bae1dSRodney W. Grimes 
1290df8bae1dSRodney W. Grimes 	case 0:				/* forwarded, but need redirect */
1291df8bae1dSRodney W. Grimes 		/* type, code set above */
1292df8bae1dSRodney W. Grimes 		break;
1293df8bae1dSRodney W. Grimes 
1294df8bae1dSRodney W. Grimes 	case ENETUNREACH:		/* shouldn't happen, checked above */
1295df8bae1dSRodney W. Grimes 	case EHOSTUNREACH:
1296df8bae1dSRodney W. Grimes 	case ENETDOWN:
1297df8bae1dSRodney W. Grimes 	case EHOSTDOWN:
1298df8bae1dSRodney W. Grimes 	default:
1299df8bae1dSRodney W. Grimes 		type = ICMP_UNREACH;
1300df8bae1dSRodney W. Grimes 		code = ICMP_UNREACH_HOST;
1301df8bae1dSRodney W. Grimes 		break;
1302df8bae1dSRodney W. Grimes 
1303df8bae1dSRodney W. Grimes 	case EMSGSIZE:
1304df8bae1dSRodney W. Grimes 		type = ICMP_UNREACH;
1305df8bae1dSRodney W. Grimes 		code = ICMP_UNREACH_NEEDFRAG;
1306df8bae1dSRodney W. Grimes 		if (ipforward_rt.ro_rt)
1307df8bae1dSRodney W. Grimes 			destifp = ipforward_rt.ro_rt->rt_ifp;
1308df8bae1dSRodney W. Grimes 		ipstat.ips_cantfrag++;
1309df8bae1dSRodney W. Grimes 		break;
1310df8bae1dSRodney W. Grimes 
1311df8bae1dSRodney W. Grimes 	case ENOBUFS:
1312df8bae1dSRodney W. Grimes 		type = ICMP_SOURCEQUENCH;
1313df8bae1dSRodney W. Grimes 		code = 0;
1314df8bae1dSRodney W. Grimes 		break;
1315df8bae1dSRodney W. Grimes 	}
1316df8bae1dSRodney W. Grimes 	icmp_error(mcopy, type, code, dest, destifp);
1317df8bae1dSRodney W. Grimes }
1318df8bae1dSRodney W. Grimes 
131982c23ebaSBill Fenner void
132082c23ebaSBill Fenner ip_savecontrol(inp, mp, ip, m)
132182c23ebaSBill Fenner 	register struct inpcb *inp;
132282c23ebaSBill Fenner 	register struct mbuf **mp;
132382c23ebaSBill Fenner 	register struct ip *ip;
132482c23ebaSBill Fenner 	register struct mbuf *m;
132582c23ebaSBill Fenner {
132682c23ebaSBill Fenner 	if (inp->inp_socket->so_options & SO_TIMESTAMP) {
132782c23ebaSBill Fenner 		struct timeval tv;
132882c23ebaSBill Fenner 
132982c23ebaSBill Fenner 		microtime(&tv);
133082c23ebaSBill Fenner 		*mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv),
133182c23ebaSBill Fenner 			SCM_TIMESTAMP, SOL_SOCKET);
133282c23ebaSBill Fenner 		if (*mp)
133382c23ebaSBill Fenner 			mp = &(*mp)->m_next;
133482c23ebaSBill Fenner 	}
133582c23ebaSBill Fenner 	if (inp->inp_flags & INP_RECVDSTADDR) {
133682c23ebaSBill Fenner 		*mp = sbcreatecontrol((caddr_t) &ip->ip_dst,
133782c23ebaSBill Fenner 		    sizeof(struct in_addr), IP_RECVDSTADDR, IPPROTO_IP);
133882c23ebaSBill Fenner 		if (*mp)
133982c23ebaSBill Fenner 			mp = &(*mp)->m_next;
134082c23ebaSBill Fenner 	}
134182c23ebaSBill Fenner #ifdef notyet
134282c23ebaSBill Fenner 	/* XXX
134382c23ebaSBill Fenner 	 * Moving these out of udp_input() made them even more broken
134482c23ebaSBill Fenner 	 * than they already were.
134582c23ebaSBill Fenner 	 */
134682c23ebaSBill Fenner 	/* options were tossed already */
134782c23ebaSBill Fenner 	if (inp->inp_flags & INP_RECVOPTS) {
134882c23ebaSBill Fenner 		*mp = sbcreatecontrol((caddr_t) opts_deleted_above,
134982c23ebaSBill Fenner 		    sizeof(struct in_addr), IP_RECVOPTS, IPPROTO_IP);
135082c23ebaSBill Fenner 		if (*mp)
135182c23ebaSBill Fenner 			mp = &(*mp)->m_next;
135282c23ebaSBill Fenner 	}
135382c23ebaSBill Fenner 	/* ip_srcroute doesn't do what we want here, need to fix */
135482c23ebaSBill Fenner 	if (inp->inp_flags & INP_RECVRETOPTS) {
135582c23ebaSBill Fenner 		*mp = sbcreatecontrol((caddr_t) ip_srcroute(),
135682c23ebaSBill Fenner 		    sizeof(struct in_addr), IP_RECVRETOPTS, IPPROTO_IP);
135782c23ebaSBill Fenner 		if (*mp)
135882c23ebaSBill Fenner 			mp = &(*mp)->m_next;
135982c23ebaSBill Fenner 	}
136082c23ebaSBill Fenner #endif
136182c23ebaSBill Fenner 	if (inp->inp_flags & INP_RECVIF) {
136282c23ebaSBill Fenner 		struct sockaddr_dl sdl;
136382c23ebaSBill Fenner 
136482c23ebaSBill Fenner 		sdl.sdl_len = offsetof(struct sockaddr_dl, sdl_data[0]);
136582c23ebaSBill Fenner 		sdl.sdl_family = AF_LINK;
136682c23ebaSBill Fenner 		sdl.sdl_index = m->m_pkthdr.rcvif ?
136782c23ebaSBill Fenner 			m->m_pkthdr.rcvif->if_index : 0;
136882c23ebaSBill Fenner 		sdl.sdl_nlen = sdl.sdl_alen = sdl.sdl_slen = 0;
136982c23ebaSBill Fenner 		*mp = sbcreatecontrol((caddr_t) &sdl, sdl.sdl_len,
137082c23ebaSBill Fenner 			IP_RECVIF, IPPROTO_IP);
137182c23ebaSBill Fenner 		if (*mp)
137282c23ebaSBill Fenner 			mp = &(*mp)->m_next;
137382c23ebaSBill Fenner 	}
137482c23ebaSBill Fenner }
137582c23ebaSBill Fenner 
1376df8bae1dSRodney W. Grimes int
1377f0068c4aSGarrett Wollman ip_rsvp_init(struct socket *so)
1378f0068c4aSGarrett Wollman {
1379f0068c4aSGarrett Wollman 	if (so->so_type != SOCK_RAW ||
1380f0068c4aSGarrett Wollman 	    so->so_proto->pr_protocol != IPPROTO_RSVP)
1381f0068c4aSGarrett Wollman 	  return EOPNOTSUPP;
1382f0068c4aSGarrett Wollman 
1383f0068c4aSGarrett Wollman 	if (ip_rsvpd != NULL)
1384f0068c4aSGarrett Wollman 	  return EADDRINUSE;
1385f0068c4aSGarrett Wollman 
1386f0068c4aSGarrett Wollman 	ip_rsvpd = so;
13871c5de19aSGarrett Wollman 	/*
13881c5de19aSGarrett Wollman 	 * This may seem silly, but we need to be sure we don't over-increment
13891c5de19aSGarrett Wollman 	 * the RSVP counter, in case something slips up.
13901c5de19aSGarrett Wollman 	 */
13911c5de19aSGarrett Wollman 	if (!ip_rsvp_on) {
13921c5de19aSGarrett Wollman 		ip_rsvp_on = 1;
13931c5de19aSGarrett Wollman 		rsvp_on++;
13941c5de19aSGarrett Wollman 	}
1395f0068c4aSGarrett Wollman 
1396f0068c4aSGarrett Wollman 	return 0;
1397f0068c4aSGarrett Wollman }
1398f0068c4aSGarrett Wollman 
1399f0068c4aSGarrett Wollman int
1400f0068c4aSGarrett Wollman ip_rsvp_done(void)
1401f0068c4aSGarrett Wollman {
1402f0068c4aSGarrett Wollman 	ip_rsvpd = NULL;
14031c5de19aSGarrett Wollman 	/*
14041c5de19aSGarrett Wollman 	 * This may seem silly, but we need to be sure we don't over-decrement
14051c5de19aSGarrett Wollman 	 * the RSVP counter, in case something slips up.
14061c5de19aSGarrett Wollman 	 */
14071c5de19aSGarrett Wollman 	if (ip_rsvp_on) {
14081c5de19aSGarrett Wollman 		ip_rsvp_on = 0;
14091c5de19aSGarrett Wollman 		rsvp_on--;
14101c5de19aSGarrett Wollman 	}
1411f0068c4aSGarrett Wollman 	return 0;
1412f0068c4aSGarrett Wollman }
1413