1df8bae1dSRodney W. Grimes /* 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 14df8bae1dSRodney W. Grimes * must display the following acknowledgement: 15df8bae1dSRodney W. Grimes * This product includes software developed by the University of 16df8bae1dSRodney W. Grimes * California, Berkeley and its contributors. 17df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 18df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 19df8bae1dSRodney W. Grimes * without specific prior written permission. 20df8bae1dSRodney W. Grimes * 21df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31df8bae1dSRodney W. Grimes * SUCH DAMAGE. 32df8bae1dSRodney W. Grimes * 33df8bae1dSRodney W. Grimes * @(#)ip_input.c 8.2 (Berkeley) 1/4/94 34c67b1d17SGarrett Wollman * $Id: ip_input.c,v 1.34 1996/01/05 20:46:53 wollman Exp $ 35df8bae1dSRodney W. Grimes */ 36df8bae1dSRodney W. Grimes 37df8bae1dSRodney W. Grimes #include <sys/param.h> 38df8bae1dSRodney W. Grimes #include <sys/systm.h> 39df8bae1dSRodney W. Grimes #include <sys/malloc.h> 40df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 41df8bae1dSRodney W. Grimes #include <sys/domain.h> 42df8bae1dSRodney W. Grimes #include <sys/protosw.h> 43df8bae1dSRodney W. Grimes #include <sys/socket.h> 44df8bae1dSRodney W. Grimes #include <sys/errno.h> 45df8bae1dSRodney W. Grimes #include <sys/time.h> 46df8bae1dSRodney W. Grimes #include <sys/kernel.h> 471025071fSGarrett Wollman #include <sys/syslog.h> 48b5e8ce9fSBruce Evans #include <sys/sysctl.h> 49df8bae1dSRodney W. Grimes 50df8bae1dSRodney W. Grimes #include <net/if.h> 51df8bae1dSRodney W. Grimes #include <net/route.h> 52748e0b0aSGarrett Wollman #include <net/netisr.h> 53df8bae1dSRodney W. Grimes 54df8bae1dSRodney W. Grimes #include <netinet/in.h> 55df8bae1dSRodney W. Grimes #include <netinet/in_systm.h> 56b5e8ce9fSBruce Evans #include <netinet/in_var.h> 57df8bae1dSRodney W. Grimes #include <netinet/ip.h> 58df8bae1dSRodney W. Grimes #include <netinet/in_pcb.h> 59df8bae1dSRodney W. Grimes #include <netinet/in_var.h> 60df8bae1dSRodney W. Grimes #include <netinet/ip_var.h> 61df8bae1dSRodney W. Grimes #include <netinet/ip_icmp.h> 62df8bae1dSRodney W. Grimes 63100ba1a6SJordan K. Hubbard #include <netinet/ip_fw.h> 64100ba1a6SJordan K. Hubbard 65f0068c4aSGarrett Wollman #include <sys/socketvar.h> 661c5de19aSGarrett Wollman int rsvp_on = 0; 67f708ef1bSPoul-Henning Kamp static int ip_rsvp_on; 68f0068c4aSGarrett Wollman struct socket *ip_rsvpd; 69f0068c4aSGarrett Wollman 70d4fb926cSGarrett Wollman static int ipforwarding = 0; 710312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_FORWARDING, forwarding, CTLFLAG_RW, 720312fbe9SPoul-Henning Kamp &ipforwarding, 0, ""); 730312fbe9SPoul-Henning Kamp 74d4fb926cSGarrett Wollman static int ipsendredirects = 1; /* XXX */ 750312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SENDREDIRECTS, redirect, CTLFLAG_RW, 760312fbe9SPoul-Henning Kamp &ipsendredirects, 0, ""); 770312fbe9SPoul-Henning Kamp 78df8bae1dSRodney W. Grimes int ip_defttl = IPDEFTTL; 790312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFTTL, ttl, CTLFLAG_RW, 800312fbe9SPoul-Henning Kamp &ip_defttl, 0, ""); 810312fbe9SPoul-Henning Kamp 820312fbe9SPoul-Henning Kamp static int ip_dosourceroute = 0; 830312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_SOURCEROUTE, sourceroute, CTLFLAG_RW, 840312fbe9SPoul-Henning Kamp &ip_dosourceroute, 0, ""); 85df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 860312fbe9SPoul-Henning Kamp static int ipprintfs = 0; 87df8bae1dSRodney W. Grimes #endif 88df8bae1dSRodney W. Grimes 89df8bae1dSRodney W. Grimes extern struct domain inetdomain; 90df8bae1dSRodney W. Grimes extern struct protosw inetsw[]; 91df8bae1dSRodney W. Grimes u_char ip_protox[IPPROTO_MAX]; 920312fbe9SPoul-Henning Kamp static int ipqmaxlen = IFQ_MAXLEN; 93df8bae1dSRodney W. Grimes struct in_ifaddr *in_ifaddr; /* first inet address */ 94df8bae1dSRodney W. Grimes struct ifqueue ipintrq; 950312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQMAXLEN, intr_queue_maxlen, CTLFLAG_RD, 960312fbe9SPoul-Henning Kamp &ipintrq.ifq_maxlen, 0, ""); 970312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_INTRQDROPS, intr_queue_drops, CTLFLAG_RD, 980312fbe9SPoul-Henning Kamp &ipintrq.ifq_drops, 0, ""); 99df8bae1dSRodney W. Grimes 100f23b4c91SGarrett Wollman struct ipstat ipstat; 101f708ef1bSPoul-Henning Kamp static struct ipq ipq; 102f23b4c91SGarrett Wollman 1030312fbe9SPoul-Henning Kamp #ifdef IPCTL_DEFMTU 1040312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_ip, IPCTL_DEFMTU, mtu, CTLFLAG_RW, 1050312fbe9SPoul-Henning Kamp &ip_mtu, 0, ""); 1060312fbe9SPoul-Henning Kamp #endif 1070312fbe9SPoul-Henning Kamp 108df8bae1dSRodney W. Grimes /* 109df8bae1dSRodney W. Grimes * We need to save the IP options in case a protocol wants to respond 110df8bae1dSRodney W. Grimes * to an incoming packet over the same route if the packet got here 111df8bae1dSRodney W. Grimes * using IP source routing. This allows connection establishment and 112df8bae1dSRodney W. Grimes * maintenance when the remote end is on a network that is not known 113df8bae1dSRodney W. Grimes * to us. 114df8bae1dSRodney W. Grimes */ 1150312fbe9SPoul-Henning Kamp static int ip_nhops = 0; 116df8bae1dSRodney W. Grimes static struct ip_srcrt { 117df8bae1dSRodney W. Grimes struct in_addr dst; /* final destination */ 118df8bae1dSRodney W. Grimes char nop; /* one NOP to align */ 119df8bae1dSRodney W. Grimes char srcopt[IPOPT_OFFSET + 1]; /* OPTVAL, OLEN and OFFSET */ 120df8bae1dSRodney W. Grimes struct in_addr route[MAX_IPOPTLEN/sizeof(struct in_addr)]; 121df8bae1dSRodney W. Grimes } ip_srcrt; 122df8bae1dSRodney W. Grimes 123df8bae1dSRodney W. Grimes static void save_rte __P((u_char *, struct in_addr)); 1240312fbe9SPoul-Henning Kamp static void ip_deq __P((struct ipasfrag *)); 1250312fbe9SPoul-Henning Kamp static int ip_dooptions __P((struct mbuf *)); 1260312fbe9SPoul-Henning Kamp static void ip_enq __P((struct ipasfrag *, struct ipasfrag *)); 1270312fbe9SPoul-Henning Kamp static void ip_forward __P((struct mbuf *, int)); 1280312fbe9SPoul-Henning Kamp static void ip_freef __P((struct ipq *)); 1290312fbe9SPoul-Henning Kamp static struct ip * 1300312fbe9SPoul-Henning Kamp ip_reass __P((struct ipasfrag *, struct ipq *)); 1310312fbe9SPoul-Henning Kamp static struct in_ifaddr * 1320312fbe9SPoul-Henning Kamp ip_rtaddr __P((struct in_addr)); 1330312fbe9SPoul-Henning Kamp static void ipintr __P((void)); 134df8bae1dSRodney W. Grimes /* 135df8bae1dSRodney W. Grimes * IP initialization: fill in IP protocol switch table. 136df8bae1dSRodney W. Grimes * All protocols not implemented in kernel go to raw IP protocol handler. 137df8bae1dSRodney W. Grimes */ 138df8bae1dSRodney W. Grimes void 139df8bae1dSRodney W. Grimes ip_init() 140df8bae1dSRodney W. Grimes { 141df8bae1dSRodney W. Grimes register struct protosw *pr; 142df8bae1dSRodney W. Grimes register int i; 143df8bae1dSRodney W. Grimes 144df8bae1dSRodney W. Grimes pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW); 145df8bae1dSRodney W. Grimes if (pr == 0) 146df8bae1dSRodney W. Grimes panic("ip_init"); 147df8bae1dSRodney W. Grimes for (i = 0; i < IPPROTO_MAX; i++) 148df8bae1dSRodney W. Grimes ip_protox[i] = pr - inetsw; 149df8bae1dSRodney W. Grimes for (pr = inetdomain.dom_protosw; 150df8bae1dSRodney W. Grimes pr < inetdomain.dom_protoswNPROTOSW; pr++) 151df8bae1dSRodney W. Grimes if (pr->pr_domain->dom_family == PF_INET && 152df8bae1dSRodney W. Grimes pr->pr_protocol && pr->pr_protocol != IPPROTO_RAW) 153df8bae1dSRodney W. Grimes ip_protox[pr->pr_protocol] = pr - inetsw; 154df8bae1dSRodney W. Grimes ipq.next = ipq.prev = &ipq; 155df8bae1dSRodney W. Grimes ip_id = time.tv_sec & 0xffff; 156df8bae1dSRodney W. Grimes ipintrq.ifq_maxlen = ipqmaxlen; 157df8bae1dSRodney W. Grimes } 158df8bae1dSRodney W. Grimes 1590312fbe9SPoul-Henning Kamp static struct sockaddr_in ipaddr = { sizeof(ipaddr), AF_INET }; 160f708ef1bSPoul-Henning Kamp static struct route ipforward_rt; 161df8bae1dSRodney W. Grimes 162df8bae1dSRodney W. Grimes /* 163df8bae1dSRodney W. Grimes * Ip input routine. Checksum and byte swap header. If fragmented 164df8bae1dSRodney W. Grimes * try to reassemble. Process options. Pass to next level. 165df8bae1dSRodney W. Grimes */ 166c67b1d17SGarrett Wollman void 167c67b1d17SGarrett Wollman ip_input(struct mbuf *m) 168df8bae1dSRodney W. Grimes { 169df8bae1dSRodney W. Grimes register struct ip *ip; 170df8bae1dSRodney W. Grimes register struct ipq *fp; 171df8bae1dSRodney W. Grimes register struct in_ifaddr *ia; 172df8bae1dSRodney W. Grimes int hlen, s; 173df8bae1dSRodney W. Grimes 174df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 175df8bae1dSRodney W. Grimes if ((m->m_flags & M_PKTHDR) == 0) 176df8bae1dSRodney W. Grimes panic("ipintr no HDR"); 177df8bae1dSRodney W. Grimes #endif 178df8bae1dSRodney W. Grimes /* 179df8bae1dSRodney W. Grimes * If no IP addresses have been set yet but the interfaces 180df8bae1dSRodney W. Grimes * are receiving, can't do anything with incoming packets yet. 181df8bae1dSRodney W. Grimes */ 182df8bae1dSRodney W. Grimes if (in_ifaddr == NULL) 183df8bae1dSRodney W. Grimes goto bad; 184df8bae1dSRodney W. Grimes ipstat.ips_total++; 185df8bae1dSRodney W. Grimes if (m->m_len < sizeof (struct ip) && 186df8bae1dSRodney W. Grimes (m = m_pullup(m, sizeof (struct ip))) == 0) { 187df8bae1dSRodney W. Grimes ipstat.ips_toosmall++; 188c67b1d17SGarrett Wollman return; 189df8bae1dSRodney W. Grimes } 190df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 191df8bae1dSRodney W. Grimes if (ip->ip_v != IPVERSION) { 192df8bae1dSRodney W. Grimes ipstat.ips_badvers++; 193df8bae1dSRodney W. Grimes goto bad; 194df8bae1dSRodney W. Grimes } 195df8bae1dSRodney W. Grimes hlen = ip->ip_hl << 2; 196df8bae1dSRodney W. Grimes if (hlen < sizeof(struct ip)) { /* minimum header length */ 197df8bae1dSRodney W. Grimes ipstat.ips_badhlen++; 198df8bae1dSRodney W. Grimes goto bad; 199df8bae1dSRodney W. Grimes } 200df8bae1dSRodney W. Grimes if (hlen > m->m_len) { 201df8bae1dSRodney W. Grimes if ((m = m_pullup(m, hlen)) == 0) { 202df8bae1dSRodney W. Grimes ipstat.ips_badhlen++; 203c67b1d17SGarrett Wollman return; 204df8bae1dSRodney W. Grimes } 205df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 206df8bae1dSRodney W. Grimes } 207623ae52eSPoul-Henning Kamp ip->ip_sum = in_cksum(m, hlen); 208623ae52eSPoul-Henning Kamp if (ip->ip_sum) { 209df8bae1dSRodney W. Grimes ipstat.ips_badsum++; 210df8bae1dSRodney W. Grimes goto bad; 211df8bae1dSRodney W. Grimes } 212df8bae1dSRodney W. Grimes 213df8bae1dSRodney W. Grimes /* 214df8bae1dSRodney W. Grimes * Convert fields to host representation. 215df8bae1dSRodney W. Grimes */ 216df8bae1dSRodney W. Grimes NTOHS(ip->ip_len); 217df8bae1dSRodney W. Grimes if (ip->ip_len < hlen) { 218df8bae1dSRodney W. Grimes ipstat.ips_badlen++; 219df8bae1dSRodney W. Grimes goto bad; 220df8bae1dSRodney W. Grimes } 221df8bae1dSRodney W. Grimes NTOHS(ip->ip_id); 222df8bae1dSRodney W. Grimes NTOHS(ip->ip_off); 223df8bae1dSRodney W. Grimes 224df8bae1dSRodney W. Grimes /* 225df8bae1dSRodney W. Grimes * Check that the amount of data in the buffers 226df8bae1dSRodney W. Grimes * is as at least much as the IP header would have us expect. 227df8bae1dSRodney W. Grimes * Trim mbufs if longer than we expect. 228df8bae1dSRodney W. Grimes * Drop packet if shorter than we expect. 229df8bae1dSRodney W. Grimes */ 230df8bae1dSRodney W. Grimes if (m->m_pkthdr.len < ip->ip_len) { 231df8bae1dSRodney W. Grimes ipstat.ips_tooshort++; 232df8bae1dSRodney W. Grimes goto bad; 233df8bae1dSRodney W. Grimes } 234df8bae1dSRodney W. Grimes if (m->m_pkthdr.len > ip->ip_len) { 235df8bae1dSRodney W. Grimes if (m->m_len == m->m_pkthdr.len) { 236df8bae1dSRodney W. Grimes m->m_len = ip->ip_len; 237df8bae1dSRodney W. Grimes m->m_pkthdr.len = ip->ip_len; 238df8bae1dSRodney W. Grimes } else 239df8bae1dSRodney W. Grimes m_adj(m, ip->ip_len - m->m_pkthdr.len); 240df8bae1dSRodney W. Grimes } 2414dd1662bSUgen J.S. Antsilevich /* 2424dd1662bSUgen J.S. Antsilevich * IpHack's section. 2434dd1662bSUgen J.S. Antsilevich * Right now when no processing on packet has done 2444dd1662bSUgen J.S. Antsilevich * and it is still fresh out of network we do our black 2454dd1662bSUgen J.S. Antsilevich * deals with it. 2464dd1662bSUgen J.S. Antsilevich * - Firewall: deny/allow 2474dd1662bSUgen J.S. Antsilevich * - Wrap: fake packet's addr/port <unimpl.> 2484dd1662bSUgen J.S. Antsilevich * - Encapsulate: put it in another IP and send out. <unimp.> 2494dd1662bSUgen J.S. Antsilevich */ 250df8bae1dSRodney W. Grimes 2514dd1662bSUgen J.S. Antsilevich if (ip_fw_chk_ptr!=NULL) 252c6e8c357SDavid Greenman if (!(*ip_fw_chk_ptr)(m,ip,m->m_pkthdr.rcvif,ip_fw_chain) ) { 253c67b1d17SGarrett Wollman return; 254100ba1a6SJordan K. Hubbard } 255100ba1a6SJordan K. Hubbard 256df8bae1dSRodney W. Grimes /* 257df8bae1dSRodney W. Grimes * Process options and, if not destined for us, 258df8bae1dSRodney W. Grimes * ship it on. ip_dooptions returns 1 when an 259df8bae1dSRodney W. Grimes * error was detected (causing an icmp message 260df8bae1dSRodney W. Grimes * to be sent and the original packet to be freed). 261df8bae1dSRodney W. Grimes */ 262df8bae1dSRodney W. Grimes ip_nhops = 0; /* for source routed packets */ 263df8bae1dSRodney W. Grimes if (hlen > sizeof (struct ip) && ip_dooptions(m)) 264c67b1d17SGarrett Wollman return; 265df8bae1dSRodney W. Grimes 266f0068c4aSGarrett Wollman /* greedy RSVP, snatches any PATH packet of the RSVP protocol and no 267f0068c4aSGarrett Wollman * matter if it is destined to another node, or whether it is 268f0068c4aSGarrett Wollman * a multicast one, RSVP wants it! and prevents it from being forwarded 269f0068c4aSGarrett Wollman * anywhere else. Also checks if the rsvp daemon is running before 270f0068c4aSGarrett Wollman * grabbing the packet. 271f0068c4aSGarrett Wollman */ 2721c5de19aSGarrett Wollman if (rsvp_on && ip->ip_p==IPPROTO_RSVP) 273f0068c4aSGarrett Wollman goto ours; 274f0068c4aSGarrett Wollman 275df8bae1dSRodney W. Grimes /* 276df8bae1dSRodney W. Grimes * Check our list of addresses, to see if the packet is for us. 277df8bae1dSRodney W. Grimes */ 278df8bae1dSRodney W. Grimes for (ia = in_ifaddr; ia; ia = ia->ia_next) { 279df8bae1dSRodney W. Grimes #define satosin(sa) ((struct sockaddr_in *)(sa)) 280df8bae1dSRodney W. Grimes 281df8bae1dSRodney W. Grimes if (IA_SIN(ia)->sin_addr.s_addr == ip->ip_dst.s_addr) 282df8bae1dSRodney W. Grimes goto ours; 283b97d15cbSGarrett Wollman if (ia->ia_ifp->if_flags & IFF_BROADCAST) { 2843dbdcb2cSGarrett Wollman #if 0 285df8bae1dSRodney W. Grimes u_long t; 286b97d15cbSGarrett Wollman #endif 287df8bae1dSRodney W. Grimes 288df8bae1dSRodney W. Grimes if (satosin(&ia->ia_broadaddr)->sin_addr.s_addr == 289df8bae1dSRodney W. Grimes ip->ip_dst.s_addr) 290df8bae1dSRodney W. Grimes goto ours; 291df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == ia->ia_netbroadcast.s_addr) 292df8bae1dSRodney W. Grimes goto ours; 2933dbdcb2cSGarrett Wollman #if 0 /* XXX - this should go away */ 294df8bae1dSRodney W. Grimes /* 295df8bae1dSRodney W. Grimes * Look for all-0's host part (old broadcast addr), 296df8bae1dSRodney W. Grimes * either for subnet or net. 297df8bae1dSRodney W. Grimes */ 298df8bae1dSRodney W. Grimes t = ntohl(ip->ip_dst.s_addr); 299df8bae1dSRodney W. Grimes if (t == ia->ia_subnet) 300df8bae1dSRodney W. Grimes goto ours; 301df8bae1dSRodney W. Grimes if (t == ia->ia_net) 302df8bae1dSRodney W. Grimes goto ours; 303b97d15cbSGarrett Wollman #endif /* compatibility cruft */ 304df8bae1dSRodney W. Grimes } 305df8bae1dSRodney W. Grimes } 306df8bae1dSRodney W. Grimes if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr))) { 307df8bae1dSRodney W. Grimes struct in_multi *inm; 308df8bae1dSRodney W. Grimes if (ip_mrouter) { 309df8bae1dSRodney W. Grimes /* 310df8bae1dSRodney W. Grimes * If we are acting as a multicast router, all 311df8bae1dSRodney W. Grimes * incoming multicast packets are passed to the 312df8bae1dSRodney W. Grimes * kernel-level multicast forwarding function. 313df8bae1dSRodney W. Grimes * The packet is returned (relatively) intact; if 314df8bae1dSRodney W. Grimes * ip_mforward() returns a non-zero value, the packet 315df8bae1dSRodney W. Grimes * must be discarded, else it may be accepted below. 316df8bae1dSRodney W. Grimes * 317df8bae1dSRodney W. Grimes * (The IP ident field is put in the same byte order 318df8bae1dSRodney W. Grimes * as expected when ip_mforward() is called from 319df8bae1dSRodney W. Grimes * ip_output().) 320df8bae1dSRodney W. Grimes */ 321df8bae1dSRodney W. Grimes ip->ip_id = htons(ip->ip_id); 322f0068c4aSGarrett Wollman if (ip_mforward(ip, m->m_pkthdr.rcvif, m, 0) != 0) { 323df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 324df8bae1dSRodney W. Grimes m_freem(m); 325c67b1d17SGarrett Wollman return; 326df8bae1dSRodney W. Grimes } 327df8bae1dSRodney W. Grimes ip->ip_id = ntohs(ip->ip_id); 328df8bae1dSRodney W. Grimes 329df8bae1dSRodney W. Grimes /* 330df8bae1dSRodney W. Grimes * The process-level routing demon needs to receive 331df8bae1dSRodney W. Grimes * all multicast IGMP packets, whether or not this 332df8bae1dSRodney W. Grimes * host belongs to their destination groups. 333df8bae1dSRodney W. Grimes */ 334df8bae1dSRodney W. Grimes if (ip->ip_p == IPPROTO_IGMP) 335df8bae1dSRodney W. Grimes goto ours; 336df8bae1dSRodney W. Grimes ipstat.ips_forward++; 337df8bae1dSRodney W. Grimes } 338df8bae1dSRodney W. Grimes /* 339df8bae1dSRodney W. Grimes * See if we belong to the destination multicast group on the 340df8bae1dSRodney W. Grimes * arrival interface. 341df8bae1dSRodney W. Grimes */ 342df8bae1dSRodney W. Grimes IN_LOOKUP_MULTI(ip->ip_dst, m->m_pkthdr.rcvif, inm); 343df8bae1dSRodney W. Grimes if (inm == NULL) { 344df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 345df8bae1dSRodney W. Grimes m_freem(m); 346c67b1d17SGarrett Wollman return; 347df8bae1dSRodney W. Grimes } 348df8bae1dSRodney W. Grimes goto ours; 349df8bae1dSRodney W. Grimes } 350df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == (u_long)INADDR_BROADCAST) 351df8bae1dSRodney W. Grimes goto ours; 352df8bae1dSRodney W. Grimes if (ip->ip_dst.s_addr == INADDR_ANY) 353df8bae1dSRodney W. Grimes goto ours; 354df8bae1dSRodney W. Grimes 355df8bae1dSRodney W. Grimes /* 356df8bae1dSRodney W. Grimes * Not for us; forward if possible and desirable. 357df8bae1dSRodney W. Grimes */ 358df8bae1dSRodney W. Grimes if (ipforwarding == 0) { 359df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 360df8bae1dSRodney W. Grimes m_freem(m); 361df8bae1dSRodney W. Grimes } else 362df8bae1dSRodney W. Grimes ip_forward(m, 0); 363c67b1d17SGarrett Wollman return; 364df8bae1dSRodney W. Grimes 365df8bae1dSRodney W. Grimes ours: 366100ba1a6SJordan K. Hubbard 36763f8d699SJordan K. Hubbard /* 36863f8d699SJordan K. Hubbard * If packet came to us we count it... 36963f8d699SJordan K. Hubbard * This way we count all incoming packets which has 37063f8d699SJordan K. Hubbard * not been forwarded... 37163f8d699SJordan K. Hubbard * Do not convert ip_len to host byte order when 37263f8d699SJordan K. Hubbard * counting,ppl already made it for us before.. 37363f8d699SJordan K. Hubbard */ 3744dd1662bSUgen J.S. Antsilevich if (ip_acct_cnt_ptr!=NULL) 3754dd1662bSUgen J.S. Antsilevich (*ip_acct_cnt_ptr)(ip,m->m_pkthdr.rcvif,ip_acct_chain,0); 37663f8d699SJordan K. Hubbard 377df8bae1dSRodney W. Grimes /* 378df8bae1dSRodney W. Grimes * If offset or IP_MF are set, must reassemble. 379df8bae1dSRodney W. Grimes * Otherwise, nothing need be done. 380df8bae1dSRodney W. Grimes * (We could look in the reassembly queue to see 381df8bae1dSRodney W. Grimes * if the packet was previously fragmented, 382df8bae1dSRodney W. Grimes * but it's not worth the time; just let them time out.) 383df8bae1dSRodney W. Grimes */ 384df8bae1dSRodney W. Grimes if (ip->ip_off &~ IP_DF) { 385df8bae1dSRodney W. Grimes if (m->m_flags & M_EXT) { /* XXX */ 386df8bae1dSRodney W. Grimes if ((m = m_pullup(m, sizeof (struct ip))) == 0) { 387df8bae1dSRodney W. Grimes ipstat.ips_toosmall++; 388c67b1d17SGarrett Wollman return; 389df8bae1dSRodney W. Grimes } 390df8bae1dSRodney W. Grimes ip = mtod(m, struct ip *); 391df8bae1dSRodney W. Grimes } 392df8bae1dSRodney W. Grimes /* 393df8bae1dSRodney W. Grimes * Look for queue of fragments 394df8bae1dSRodney W. Grimes * of this datagram. 395df8bae1dSRodney W. Grimes */ 396df8bae1dSRodney W. Grimes for (fp = ipq.next; fp != &ipq; fp = fp->next) 397df8bae1dSRodney W. Grimes if (ip->ip_id == fp->ipq_id && 398df8bae1dSRodney W. Grimes ip->ip_src.s_addr == fp->ipq_src.s_addr && 399df8bae1dSRodney W. Grimes ip->ip_dst.s_addr == fp->ipq_dst.s_addr && 400df8bae1dSRodney W. Grimes ip->ip_p == fp->ipq_p) 401df8bae1dSRodney W. Grimes goto found; 402df8bae1dSRodney W. Grimes fp = 0; 403df8bae1dSRodney W. Grimes found: 404df8bae1dSRodney W. Grimes 405df8bae1dSRodney W. Grimes /* 406df8bae1dSRodney W. Grimes * Adjust ip_len to not reflect header, 407df8bae1dSRodney W. Grimes * set ip_mff if more fragments are expected, 408df8bae1dSRodney W. Grimes * convert offset of this to bytes. 409df8bae1dSRodney W. Grimes */ 410df8bae1dSRodney W. Grimes ip->ip_len -= hlen; 411df8bae1dSRodney W. Grimes ((struct ipasfrag *)ip)->ipf_mff &= ~1; 412df8bae1dSRodney W. Grimes if (ip->ip_off & IP_MF) 413df8bae1dSRodney W. Grimes ((struct ipasfrag *)ip)->ipf_mff |= 1; 414df8bae1dSRodney W. Grimes ip->ip_off <<= 3; 415df8bae1dSRodney W. Grimes 416df8bae1dSRodney W. Grimes /* 417df8bae1dSRodney W. Grimes * If datagram marked as having more fragments 418df8bae1dSRodney W. Grimes * or if this is not the first fragment, 419df8bae1dSRodney W. Grimes * attempt reassembly; if it succeeds, proceed. 420df8bae1dSRodney W. Grimes */ 421df8bae1dSRodney W. Grimes if (((struct ipasfrag *)ip)->ipf_mff & 1 || ip->ip_off) { 422df8bae1dSRodney W. Grimes ipstat.ips_fragments++; 423df8bae1dSRodney W. Grimes ip = ip_reass((struct ipasfrag *)ip, fp); 424df8bae1dSRodney W. Grimes if (ip == 0) 425c67b1d17SGarrett Wollman return; 426df8bae1dSRodney W. Grimes ipstat.ips_reassembled++; 427df8bae1dSRodney W. Grimes m = dtom(ip); 428df8bae1dSRodney W. Grimes } else 429df8bae1dSRodney W. Grimes if (fp) 430df8bae1dSRodney W. Grimes ip_freef(fp); 431df8bae1dSRodney W. Grimes } else 432df8bae1dSRodney W. Grimes ip->ip_len -= hlen; 433df8bae1dSRodney W. Grimes 434df8bae1dSRodney W. Grimes /* 435df8bae1dSRodney W. Grimes * Switch out to protocol's input routine. 436df8bae1dSRodney W. Grimes */ 437df8bae1dSRodney W. Grimes ipstat.ips_delivered++; 438df8bae1dSRodney W. Grimes (*inetsw[ip_protox[ip->ip_p]].pr_input)(m, hlen); 439c67b1d17SGarrett Wollman return; 440df8bae1dSRodney W. Grimes bad: 441df8bae1dSRodney W. Grimes m_freem(m); 442c67b1d17SGarrett Wollman } 443c67b1d17SGarrett Wollman 444c67b1d17SGarrett Wollman /* 445c67b1d17SGarrett Wollman * IP software interrupt routine - to go away sometime soon 446c67b1d17SGarrett Wollman */ 447c67b1d17SGarrett Wollman static void 448c67b1d17SGarrett Wollman ipintr(void) 449c67b1d17SGarrett Wollman { 450c67b1d17SGarrett Wollman int s; 451c67b1d17SGarrett Wollman struct mbuf *m; 452c67b1d17SGarrett Wollman 453c67b1d17SGarrett Wollman while(1) { 454c67b1d17SGarrett Wollman s = splimp(); 455c67b1d17SGarrett Wollman IF_DEQUEUE(&ipintrq, m); 456c67b1d17SGarrett Wollman splx(s); 457c67b1d17SGarrett Wollman if (m == 0) 458c67b1d17SGarrett Wollman return; 459c67b1d17SGarrett Wollman ip_input(m); 460c67b1d17SGarrett Wollman } 461df8bae1dSRodney W. Grimes } 462df8bae1dSRodney W. Grimes 463748e0b0aSGarrett Wollman NETISR_SET(NETISR_IP, ipintr); 464748e0b0aSGarrett Wollman 465df8bae1dSRodney W. Grimes /* 466df8bae1dSRodney W. Grimes * Take incoming datagram fragment and try to 467df8bae1dSRodney W. Grimes * reassemble it into whole datagram. If a chain for 468df8bae1dSRodney W. Grimes * reassembly of this datagram already exists, then it 469df8bae1dSRodney W. Grimes * is given as fp; otherwise have to make a chain. 470df8bae1dSRodney W. Grimes */ 4710312fbe9SPoul-Henning Kamp static struct ip * 472df8bae1dSRodney W. Grimes ip_reass(ip, fp) 473df8bae1dSRodney W. Grimes register struct ipasfrag *ip; 474df8bae1dSRodney W. Grimes register struct ipq *fp; 475df8bae1dSRodney W. Grimes { 476df8bae1dSRodney W. Grimes register struct mbuf *m = dtom(ip); 477df8bae1dSRodney W. Grimes register struct ipasfrag *q; 478df8bae1dSRodney W. Grimes struct mbuf *t; 479df8bae1dSRodney W. Grimes int hlen = ip->ip_hl << 2; 480df8bae1dSRodney W. Grimes int i, next; 481df8bae1dSRodney W. Grimes 482df8bae1dSRodney W. Grimes /* 483df8bae1dSRodney W. Grimes * Presence of header sizes in mbufs 484df8bae1dSRodney W. Grimes * would confuse code below. 485df8bae1dSRodney W. Grimes */ 486df8bae1dSRodney W. Grimes m->m_data += hlen; 487df8bae1dSRodney W. Grimes m->m_len -= hlen; 488df8bae1dSRodney W. Grimes 489df8bae1dSRodney W. Grimes /* 490df8bae1dSRodney W. Grimes * If first fragment to arrive, create a reassembly queue. 491df8bae1dSRodney W. Grimes */ 492df8bae1dSRodney W. Grimes if (fp == 0) { 493df8bae1dSRodney W. Grimes if ((t = m_get(M_DONTWAIT, MT_FTABLE)) == NULL) 494df8bae1dSRodney W. Grimes goto dropfrag; 495df8bae1dSRodney W. Grimes fp = mtod(t, struct ipq *); 496df8bae1dSRodney W. Grimes insque(fp, &ipq); 497df8bae1dSRodney W. Grimes fp->ipq_ttl = IPFRAGTTL; 498df8bae1dSRodney W. Grimes fp->ipq_p = ip->ip_p; 499df8bae1dSRodney W. Grimes fp->ipq_id = ip->ip_id; 500df8bae1dSRodney W. Grimes fp->ipq_next = fp->ipq_prev = (struct ipasfrag *)fp; 501df8bae1dSRodney W. Grimes fp->ipq_src = ((struct ip *)ip)->ip_src; 502df8bae1dSRodney W. Grimes fp->ipq_dst = ((struct ip *)ip)->ip_dst; 503df8bae1dSRodney W. Grimes q = (struct ipasfrag *)fp; 504df8bae1dSRodney W. Grimes goto insert; 505df8bae1dSRodney W. Grimes } 506df8bae1dSRodney W. Grimes 507df8bae1dSRodney W. Grimes /* 508df8bae1dSRodney W. Grimes * Find a segment which begins after this one does. 509df8bae1dSRodney W. Grimes */ 510df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next) 511df8bae1dSRodney W. Grimes if (q->ip_off > ip->ip_off) 512df8bae1dSRodney W. Grimes break; 513df8bae1dSRodney W. Grimes 514df8bae1dSRodney W. Grimes /* 515df8bae1dSRodney W. Grimes * If there is a preceding segment, it may provide some of 516df8bae1dSRodney W. Grimes * our data already. If so, drop the data from the incoming 517df8bae1dSRodney W. Grimes * segment. If it provides all of our data, drop us. 518df8bae1dSRodney W. Grimes */ 519df8bae1dSRodney W. Grimes if (q->ipf_prev != (struct ipasfrag *)fp) { 520df8bae1dSRodney W. Grimes i = q->ipf_prev->ip_off + q->ipf_prev->ip_len - ip->ip_off; 521df8bae1dSRodney W. Grimes if (i > 0) { 522df8bae1dSRodney W. Grimes if (i >= ip->ip_len) 523df8bae1dSRodney W. Grimes goto dropfrag; 524df8bae1dSRodney W. Grimes m_adj(dtom(ip), i); 525df8bae1dSRodney W. Grimes ip->ip_off += i; 526df8bae1dSRodney W. Grimes ip->ip_len -= i; 527df8bae1dSRodney W. Grimes } 528df8bae1dSRodney W. Grimes } 529df8bae1dSRodney W. Grimes 530df8bae1dSRodney W. Grimes /* 531df8bae1dSRodney W. Grimes * While we overlap succeeding segments trim them or, 532df8bae1dSRodney W. Grimes * if they are completely covered, dequeue them. 533df8bae1dSRodney W. Grimes */ 534df8bae1dSRodney W. Grimes while (q != (struct ipasfrag *)fp && ip->ip_off + ip->ip_len > q->ip_off) { 535df8bae1dSRodney W. Grimes i = (ip->ip_off + ip->ip_len) - q->ip_off; 536df8bae1dSRodney W. Grimes if (i < q->ip_len) { 537df8bae1dSRodney W. Grimes q->ip_len -= i; 538df8bae1dSRodney W. Grimes q->ip_off += i; 539df8bae1dSRodney W. Grimes m_adj(dtom(q), i); 540df8bae1dSRodney W. Grimes break; 541df8bae1dSRodney W. Grimes } 542df8bae1dSRodney W. Grimes q = q->ipf_next; 543df8bae1dSRodney W. Grimes m_freem(dtom(q->ipf_prev)); 544df8bae1dSRodney W. Grimes ip_deq(q->ipf_prev); 545df8bae1dSRodney W. Grimes } 546df8bae1dSRodney W. Grimes 547df8bae1dSRodney W. Grimes insert: 548df8bae1dSRodney W. Grimes /* 549df8bae1dSRodney W. Grimes * Stick new segment in its place; 550df8bae1dSRodney W. Grimes * check for complete reassembly. 551df8bae1dSRodney W. Grimes */ 552df8bae1dSRodney W. Grimes ip_enq(ip, q->ipf_prev); 553df8bae1dSRodney W. Grimes next = 0; 554df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = q->ipf_next) { 555df8bae1dSRodney W. Grimes if (q->ip_off != next) 556df8bae1dSRodney W. Grimes return (0); 557df8bae1dSRodney W. Grimes next += q->ip_len; 558df8bae1dSRodney W. Grimes } 559df8bae1dSRodney W. Grimes if (q->ipf_prev->ipf_mff & 1) 560df8bae1dSRodney W. Grimes return (0); 561df8bae1dSRodney W. Grimes 562df8bae1dSRodney W. Grimes /* 563df8bae1dSRodney W. Grimes * Reassembly is complete; concatenate fragments. 564df8bae1dSRodney W. Grimes */ 565df8bae1dSRodney W. Grimes q = fp->ipq_next; 566df8bae1dSRodney W. Grimes m = dtom(q); 567df8bae1dSRodney W. Grimes t = m->m_next; 568df8bae1dSRodney W. Grimes m->m_next = 0; 569df8bae1dSRodney W. Grimes m_cat(m, t); 570df8bae1dSRodney W. Grimes q = q->ipf_next; 571df8bae1dSRodney W. Grimes while (q != (struct ipasfrag *)fp) { 572df8bae1dSRodney W. Grimes t = dtom(q); 573df8bae1dSRodney W. Grimes q = q->ipf_next; 574df8bae1dSRodney W. Grimes m_cat(m, t); 575df8bae1dSRodney W. Grimes } 576df8bae1dSRodney W. Grimes 577df8bae1dSRodney W. Grimes /* 578df8bae1dSRodney W. Grimes * Create header for new ip packet by 579df8bae1dSRodney W. Grimes * modifying header of first packet; 580df8bae1dSRodney W. Grimes * dequeue and discard fragment reassembly header. 581df8bae1dSRodney W. Grimes * Make header visible. 582df8bae1dSRodney W. Grimes */ 583df8bae1dSRodney W. Grimes ip = fp->ipq_next; 584df8bae1dSRodney W. Grimes ip->ip_len = next; 585df8bae1dSRodney W. Grimes ip->ipf_mff &= ~1; 586df8bae1dSRodney W. Grimes ((struct ip *)ip)->ip_src = fp->ipq_src; 587df8bae1dSRodney W. Grimes ((struct ip *)ip)->ip_dst = fp->ipq_dst; 588df8bae1dSRodney W. Grimes remque(fp); 589df8bae1dSRodney W. Grimes (void) m_free(dtom(fp)); 590df8bae1dSRodney W. Grimes m = dtom(ip); 591df8bae1dSRodney W. Grimes m->m_len += (ip->ip_hl << 2); 592df8bae1dSRodney W. Grimes m->m_data -= (ip->ip_hl << 2); 593df8bae1dSRodney W. Grimes /* some debugging cruft by sklower, below, will go away soon */ 594df8bae1dSRodney W. Grimes if (m->m_flags & M_PKTHDR) { /* XXX this should be done elsewhere */ 595df8bae1dSRodney W. Grimes register int plen = 0; 596df8bae1dSRodney W. Grimes for (t = m; m; m = m->m_next) 597df8bae1dSRodney W. Grimes plen += m->m_len; 598df8bae1dSRodney W. Grimes t->m_pkthdr.len = plen; 599df8bae1dSRodney W. Grimes } 600df8bae1dSRodney W. Grimes return ((struct ip *)ip); 601df8bae1dSRodney W. Grimes 602df8bae1dSRodney W. Grimes dropfrag: 603df8bae1dSRodney W. Grimes ipstat.ips_fragdropped++; 604df8bae1dSRodney W. Grimes m_freem(m); 605df8bae1dSRodney W. Grimes return (0); 606df8bae1dSRodney W. Grimes } 607df8bae1dSRodney W. Grimes 608df8bae1dSRodney W. Grimes /* 609df8bae1dSRodney W. Grimes * Free a fragment reassembly header and all 610df8bae1dSRodney W. Grimes * associated datagrams. 611df8bae1dSRodney W. Grimes */ 6120312fbe9SPoul-Henning Kamp static void 613df8bae1dSRodney W. Grimes ip_freef(fp) 614df8bae1dSRodney W. Grimes struct ipq *fp; 615df8bae1dSRodney W. Grimes { 616df8bae1dSRodney W. Grimes register struct ipasfrag *q, *p; 617df8bae1dSRodney W. Grimes 618df8bae1dSRodney W. Grimes for (q = fp->ipq_next; q != (struct ipasfrag *)fp; q = p) { 619df8bae1dSRodney W. Grimes p = q->ipf_next; 620df8bae1dSRodney W. Grimes ip_deq(q); 621df8bae1dSRodney W. Grimes m_freem(dtom(q)); 622df8bae1dSRodney W. Grimes } 623df8bae1dSRodney W. Grimes remque(fp); 624df8bae1dSRodney W. Grimes (void) m_free(dtom(fp)); 625df8bae1dSRodney W. Grimes } 626df8bae1dSRodney W. Grimes 627df8bae1dSRodney W. Grimes /* 628df8bae1dSRodney W. Grimes * Put an ip fragment on a reassembly chain. 629df8bae1dSRodney W. Grimes * Like insque, but pointers in middle of structure. 630df8bae1dSRodney W. Grimes */ 6310312fbe9SPoul-Henning Kamp static void 632df8bae1dSRodney W. Grimes ip_enq(p, prev) 633df8bae1dSRodney W. Grimes register struct ipasfrag *p, *prev; 634df8bae1dSRodney W. Grimes { 635df8bae1dSRodney W. Grimes 636df8bae1dSRodney W. Grimes p->ipf_prev = prev; 637df8bae1dSRodney W. Grimes p->ipf_next = prev->ipf_next; 638df8bae1dSRodney W. Grimes prev->ipf_next->ipf_prev = p; 639df8bae1dSRodney W. Grimes prev->ipf_next = p; 640df8bae1dSRodney W. Grimes } 641df8bae1dSRodney W. Grimes 642df8bae1dSRodney W. Grimes /* 643df8bae1dSRodney W. Grimes * To ip_enq as remque is to insque. 644df8bae1dSRodney W. Grimes */ 6450312fbe9SPoul-Henning Kamp static void 646df8bae1dSRodney W. Grimes ip_deq(p) 647df8bae1dSRodney W. Grimes register struct ipasfrag *p; 648df8bae1dSRodney W. Grimes { 649df8bae1dSRodney W. Grimes 650df8bae1dSRodney W. Grimes p->ipf_prev->ipf_next = p->ipf_next; 651df8bae1dSRodney W. Grimes p->ipf_next->ipf_prev = p->ipf_prev; 652df8bae1dSRodney W. Grimes } 653df8bae1dSRodney W. Grimes 654df8bae1dSRodney W. Grimes /* 655df8bae1dSRodney W. Grimes * IP timer processing; 656df8bae1dSRodney W. Grimes * if a timer expires on a reassembly 657df8bae1dSRodney W. Grimes * queue, discard it. 658df8bae1dSRodney W. Grimes */ 659df8bae1dSRodney W. Grimes void 660df8bae1dSRodney W. Grimes ip_slowtimo() 661df8bae1dSRodney W. Grimes { 662df8bae1dSRodney W. Grimes register struct ipq *fp; 663df8bae1dSRodney W. Grimes int s = splnet(); 664df8bae1dSRodney W. Grimes 665df8bae1dSRodney W. Grimes fp = ipq.next; 666df8bae1dSRodney W. Grimes if (fp == 0) { 667df8bae1dSRodney W. Grimes splx(s); 668df8bae1dSRodney W. Grimes return; 669df8bae1dSRodney W. Grimes } 670df8bae1dSRodney W. Grimes while (fp != &ipq) { 671df8bae1dSRodney W. Grimes --fp->ipq_ttl; 672df8bae1dSRodney W. Grimes fp = fp->next; 673df8bae1dSRodney W. Grimes if (fp->prev->ipq_ttl == 0) { 674df8bae1dSRodney W. Grimes ipstat.ips_fragtimeout++; 675df8bae1dSRodney W. Grimes ip_freef(fp->prev); 676df8bae1dSRodney W. Grimes } 677df8bae1dSRodney W. Grimes } 678df8bae1dSRodney W. Grimes splx(s); 679df8bae1dSRodney W. Grimes } 680df8bae1dSRodney W. Grimes 681df8bae1dSRodney W. Grimes /* 682df8bae1dSRodney W. Grimes * Drain off all datagram fragments. 683df8bae1dSRodney W. Grimes */ 684df8bae1dSRodney W. Grimes void 685df8bae1dSRodney W. Grimes ip_drain() 686df8bae1dSRodney W. Grimes { 687df8bae1dSRodney W. Grimes while (ipq.next != &ipq) { 688df8bae1dSRodney W. Grimes ipstat.ips_fragdropped++; 689df8bae1dSRodney W. Grimes ip_freef(ipq.next); 690df8bae1dSRodney W. Grimes } 691ce29ab3aSGarrett Wollman 692ce29ab3aSGarrett Wollman in_rtqdrain(); 693df8bae1dSRodney W. Grimes } 694df8bae1dSRodney W. Grimes 695df8bae1dSRodney W. Grimes /* 696df8bae1dSRodney W. Grimes * Do option processing on a datagram, 697df8bae1dSRodney W. Grimes * possibly discarding it if bad options are encountered, 698df8bae1dSRodney W. Grimes * or forwarding it if source-routed. 699df8bae1dSRodney W. Grimes * Returns 1 if packet has been forwarded/freed, 700df8bae1dSRodney W. Grimes * 0 if the packet should be processed further. 701df8bae1dSRodney W. Grimes */ 7020312fbe9SPoul-Henning Kamp static int 703df8bae1dSRodney W. Grimes ip_dooptions(m) 704df8bae1dSRodney W. Grimes struct mbuf *m; 705df8bae1dSRodney W. Grimes { 706df8bae1dSRodney W. Grimes register struct ip *ip = mtod(m, struct ip *); 707df8bae1dSRodney W. Grimes register u_char *cp; 708df8bae1dSRodney W. Grimes register struct ip_timestamp *ipt; 709df8bae1dSRodney W. Grimes register struct in_ifaddr *ia; 710df8bae1dSRodney W. Grimes int opt, optlen, cnt, off, code, type = ICMP_PARAMPROB, forward = 0; 711df8bae1dSRodney W. Grimes struct in_addr *sin, dst; 712df8bae1dSRodney W. Grimes n_time ntime; 713df8bae1dSRodney W. Grimes 714df8bae1dSRodney W. Grimes dst = ip->ip_dst; 715df8bae1dSRodney W. Grimes cp = (u_char *)(ip + 1); 716df8bae1dSRodney W. Grimes cnt = (ip->ip_hl << 2) - sizeof (struct ip); 717df8bae1dSRodney W. Grimes for (; cnt > 0; cnt -= optlen, cp += optlen) { 718df8bae1dSRodney W. Grimes opt = cp[IPOPT_OPTVAL]; 719df8bae1dSRodney W. Grimes if (opt == IPOPT_EOL) 720df8bae1dSRodney W. Grimes break; 721df8bae1dSRodney W. Grimes if (opt == IPOPT_NOP) 722df8bae1dSRodney W. Grimes optlen = 1; 723df8bae1dSRodney W. Grimes else { 724df8bae1dSRodney W. Grimes optlen = cp[IPOPT_OLEN]; 725df8bae1dSRodney W. Grimes if (optlen <= 0 || optlen > cnt) { 726df8bae1dSRodney W. Grimes code = &cp[IPOPT_OLEN] - (u_char *)ip; 727df8bae1dSRodney W. Grimes goto bad; 728df8bae1dSRodney W. Grimes } 729df8bae1dSRodney W. Grimes } 730df8bae1dSRodney W. Grimes switch (opt) { 731df8bae1dSRodney W. Grimes 732df8bae1dSRodney W. Grimes default: 733df8bae1dSRodney W. Grimes break; 734df8bae1dSRodney W. Grimes 735df8bae1dSRodney W. Grimes /* 736df8bae1dSRodney W. Grimes * Source routing with record. 737df8bae1dSRodney W. Grimes * Find interface with current destination address. 738df8bae1dSRodney W. Grimes * If none on this machine then drop if strictly routed, 739df8bae1dSRodney W. Grimes * or do nothing if loosely routed. 740df8bae1dSRodney W. Grimes * Record interface address and bring up next address 741df8bae1dSRodney W. Grimes * component. If strictly routed make sure next 742df8bae1dSRodney W. Grimes * address is on directly accessible net. 743df8bae1dSRodney W. Grimes */ 744df8bae1dSRodney W. Grimes case IPOPT_LSRR: 745df8bae1dSRodney W. Grimes case IPOPT_SSRR: 746df8bae1dSRodney W. Grimes if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) { 747df8bae1dSRodney W. Grimes code = &cp[IPOPT_OFFSET] - (u_char *)ip; 748df8bae1dSRodney W. Grimes goto bad; 749df8bae1dSRodney W. Grimes } 750df8bae1dSRodney W. Grimes ipaddr.sin_addr = ip->ip_dst; 751df8bae1dSRodney W. Grimes ia = (struct in_ifaddr *) 752df8bae1dSRodney W. Grimes ifa_ifwithaddr((struct sockaddr *)&ipaddr); 753df8bae1dSRodney W. Grimes if (ia == 0) { 754df8bae1dSRodney W. Grimes if (opt == IPOPT_SSRR) { 755df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 756df8bae1dSRodney W. Grimes code = ICMP_UNREACH_SRCFAIL; 757df8bae1dSRodney W. Grimes goto bad; 758df8bae1dSRodney W. Grimes } 759df8bae1dSRodney W. Grimes /* 760df8bae1dSRodney W. Grimes * Loose routing, and not at next destination 761df8bae1dSRodney W. Grimes * yet; nothing to do except forward. 762df8bae1dSRodney W. Grimes */ 763df8bae1dSRodney W. Grimes break; 764df8bae1dSRodney W. Grimes } 765df8bae1dSRodney W. Grimes off--; /* 0 origin */ 766df8bae1dSRodney W. Grimes if (off > optlen - sizeof(struct in_addr)) { 767df8bae1dSRodney W. Grimes /* 768df8bae1dSRodney W. Grimes * End of source route. Should be for us. 769df8bae1dSRodney W. Grimes */ 770df8bae1dSRodney W. Grimes save_rte(cp, ip->ip_src); 771df8bae1dSRodney W. Grimes break; 772df8bae1dSRodney W. Grimes } 7731025071fSGarrett Wollman 7741025071fSGarrett Wollman if (!ip_dosourceroute) { 7751025071fSGarrett Wollman char buf[4*sizeof "123"]; 7761025071fSGarrett Wollman strcpy(buf, inet_ntoa(ip->ip_dst)); 7771025071fSGarrett Wollman 7781025071fSGarrett Wollman log(LOG_WARNING, 7791025071fSGarrett Wollman "attempted source route from %s to %s\n", 7801025071fSGarrett Wollman inet_ntoa(ip->ip_src), buf); 7811025071fSGarrett Wollman type = ICMP_UNREACH; 7821025071fSGarrett Wollman code = ICMP_UNREACH_SRCFAIL; 7831025071fSGarrett Wollman goto bad; 7841025071fSGarrett Wollman } 7851025071fSGarrett Wollman 786df8bae1dSRodney W. Grimes /* 787df8bae1dSRodney W. Grimes * locate outgoing interface 788df8bae1dSRodney W. Grimes */ 78994a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, cp + off, 790df8bae1dSRodney W. Grimes sizeof(ipaddr.sin_addr)); 7911025071fSGarrett Wollman 792df8bae1dSRodney W. Grimes if (opt == IPOPT_SSRR) { 793df8bae1dSRodney W. Grimes #define INA struct in_ifaddr * 794df8bae1dSRodney W. Grimes #define SA struct sockaddr * 795df8bae1dSRodney W. Grimes if ((ia = (INA)ifa_ifwithdstaddr((SA)&ipaddr)) == 0) 796df8bae1dSRodney W. Grimes ia = (INA)ifa_ifwithnet((SA)&ipaddr); 797df8bae1dSRodney W. Grimes } else 798df8bae1dSRodney W. Grimes ia = ip_rtaddr(ipaddr.sin_addr); 799df8bae1dSRodney W. Grimes if (ia == 0) { 800df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 801df8bae1dSRodney W. Grimes code = ICMP_UNREACH_SRCFAIL; 802df8bae1dSRodney W. Grimes goto bad; 803df8bae1dSRodney W. Grimes } 804df8bae1dSRodney W. Grimes ip->ip_dst = ipaddr.sin_addr; 80594a5d9b6SDavid Greenman (void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr), 80694a5d9b6SDavid Greenman sizeof(struct in_addr)); 807df8bae1dSRodney W. Grimes cp[IPOPT_OFFSET] += sizeof(struct in_addr); 808df8bae1dSRodney W. Grimes /* 809df8bae1dSRodney W. Grimes * Let ip_intr's mcast routing check handle mcast pkts 810df8bae1dSRodney W. Grimes */ 811df8bae1dSRodney W. Grimes forward = !IN_MULTICAST(ntohl(ip->ip_dst.s_addr)); 812df8bae1dSRodney W. Grimes break; 813df8bae1dSRodney W. Grimes 814df8bae1dSRodney W. Grimes case IPOPT_RR: 815df8bae1dSRodney W. Grimes if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) { 816df8bae1dSRodney W. Grimes code = &cp[IPOPT_OFFSET] - (u_char *)ip; 817df8bae1dSRodney W. Grimes goto bad; 818df8bae1dSRodney W. Grimes } 819df8bae1dSRodney W. Grimes /* 820df8bae1dSRodney W. Grimes * If no space remains, ignore. 821df8bae1dSRodney W. Grimes */ 822df8bae1dSRodney W. Grimes off--; /* 0 origin */ 823df8bae1dSRodney W. Grimes if (off > optlen - sizeof(struct in_addr)) 824df8bae1dSRodney W. Grimes break; 82594a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, &ip->ip_dst, 826df8bae1dSRodney W. Grimes sizeof(ipaddr.sin_addr)); 827df8bae1dSRodney W. Grimes /* 828df8bae1dSRodney W. Grimes * locate outgoing interface; if we're the destination, 829df8bae1dSRodney W. Grimes * use the incoming interface (should be same). 830df8bae1dSRodney W. Grimes */ 831df8bae1dSRodney W. Grimes if ((ia = (INA)ifa_ifwithaddr((SA)&ipaddr)) == 0 && 832df8bae1dSRodney W. Grimes (ia = ip_rtaddr(ipaddr.sin_addr)) == 0) { 833df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 834df8bae1dSRodney W. Grimes code = ICMP_UNREACH_HOST; 835df8bae1dSRodney W. Grimes goto bad; 836df8bae1dSRodney W. Grimes } 83794a5d9b6SDavid Greenman (void)memcpy(cp + off, &(IA_SIN(ia)->sin_addr), 83894a5d9b6SDavid Greenman sizeof(struct in_addr)); 839df8bae1dSRodney W. Grimes cp[IPOPT_OFFSET] += sizeof(struct in_addr); 840df8bae1dSRodney W. Grimes break; 841df8bae1dSRodney W. Grimes 842df8bae1dSRodney W. Grimes case IPOPT_TS: 843df8bae1dSRodney W. Grimes code = cp - (u_char *)ip; 844df8bae1dSRodney W. Grimes ipt = (struct ip_timestamp *)cp; 845df8bae1dSRodney W. Grimes if (ipt->ipt_len < 5) 846df8bae1dSRodney W. Grimes goto bad; 847df8bae1dSRodney W. Grimes if (ipt->ipt_ptr > ipt->ipt_len - sizeof (long)) { 848df8bae1dSRodney W. Grimes if (++ipt->ipt_oflw == 0) 849df8bae1dSRodney W. Grimes goto bad; 850df8bae1dSRodney W. Grimes break; 851df8bae1dSRodney W. Grimes } 852df8bae1dSRodney W. Grimes sin = (struct in_addr *)(cp + ipt->ipt_ptr - 1); 853df8bae1dSRodney W. Grimes switch (ipt->ipt_flg) { 854df8bae1dSRodney W. Grimes 855df8bae1dSRodney W. Grimes case IPOPT_TS_TSONLY: 856df8bae1dSRodney W. Grimes break; 857df8bae1dSRodney W. Grimes 858df8bae1dSRodney W. Grimes case IPOPT_TS_TSANDADDR: 859df8bae1dSRodney W. Grimes if (ipt->ipt_ptr + sizeof(n_time) + 860df8bae1dSRodney W. Grimes sizeof(struct in_addr) > ipt->ipt_len) 861df8bae1dSRodney W. Grimes goto bad; 862df8bae1dSRodney W. Grimes ipaddr.sin_addr = dst; 863df8bae1dSRodney W. Grimes ia = (INA)ifaof_ifpforaddr((SA)&ipaddr, 864df8bae1dSRodney W. Grimes m->m_pkthdr.rcvif); 865df8bae1dSRodney W. Grimes if (ia == 0) 866df8bae1dSRodney W. Grimes continue; 86794a5d9b6SDavid Greenman (void)memcpy(sin, &IA_SIN(ia)->sin_addr, 86894a5d9b6SDavid Greenman sizeof(struct in_addr)); 869df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(struct in_addr); 870df8bae1dSRodney W. Grimes break; 871df8bae1dSRodney W. Grimes 872df8bae1dSRodney W. Grimes case IPOPT_TS_PRESPEC: 873df8bae1dSRodney W. Grimes if (ipt->ipt_ptr + sizeof(n_time) + 874df8bae1dSRodney W. Grimes sizeof(struct in_addr) > ipt->ipt_len) 875df8bae1dSRodney W. Grimes goto bad; 87694a5d9b6SDavid Greenman (void)memcpy(&ipaddr.sin_addr, sin, 877df8bae1dSRodney W. Grimes sizeof(struct in_addr)); 878df8bae1dSRodney W. Grimes if (ifa_ifwithaddr((SA)&ipaddr) == 0) 879df8bae1dSRodney W. Grimes continue; 880df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(struct in_addr); 881df8bae1dSRodney W. Grimes break; 882df8bae1dSRodney W. Grimes 883df8bae1dSRodney W. Grimes default: 884df8bae1dSRodney W. Grimes goto bad; 885df8bae1dSRodney W. Grimes } 886df8bae1dSRodney W. Grimes ntime = iptime(); 88794a5d9b6SDavid Greenman (void)memcpy(cp + ipt->ipt_ptr - 1, &ntime, 888df8bae1dSRodney W. Grimes sizeof(n_time)); 889df8bae1dSRodney W. Grimes ipt->ipt_ptr += sizeof(n_time); 890df8bae1dSRodney W. Grimes } 891df8bae1dSRodney W. Grimes } 892df8bae1dSRodney W. Grimes if (forward) { 893df8bae1dSRodney W. Grimes ip_forward(m, 1); 894df8bae1dSRodney W. Grimes return (1); 895df8bae1dSRodney W. Grimes } 896df8bae1dSRodney W. Grimes return (0); 897df8bae1dSRodney W. Grimes bad: 898df8bae1dSRodney W. Grimes ip->ip_len -= ip->ip_hl << 2; /* XXX icmp_error adds in hdr length */ 899df8bae1dSRodney W. Grimes icmp_error(m, type, code, 0, 0); 900df8bae1dSRodney W. Grimes ipstat.ips_badoptions++; 901df8bae1dSRodney W. Grimes return (1); 902df8bae1dSRodney W. Grimes } 903df8bae1dSRodney W. Grimes 904df8bae1dSRodney W. Grimes /* 905df8bae1dSRodney W. Grimes * Given address of next destination (final or next hop), 906df8bae1dSRodney W. Grimes * return internet address info of interface to be used to get there. 907df8bae1dSRodney W. Grimes */ 9080312fbe9SPoul-Henning Kamp static struct in_ifaddr * 909df8bae1dSRodney W. Grimes ip_rtaddr(dst) 910df8bae1dSRodney W. Grimes struct in_addr dst; 911df8bae1dSRodney W. Grimes { 912df8bae1dSRodney W. Grimes register struct sockaddr_in *sin; 913df8bae1dSRodney W. Grimes 914df8bae1dSRodney W. Grimes sin = (struct sockaddr_in *) &ipforward_rt.ro_dst; 915df8bae1dSRodney W. Grimes 916df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0 || dst.s_addr != sin->sin_addr.s_addr) { 917df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) { 918df8bae1dSRodney W. Grimes RTFREE(ipforward_rt.ro_rt); 919df8bae1dSRodney W. Grimes ipforward_rt.ro_rt = 0; 920df8bae1dSRodney W. Grimes } 921df8bae1dSRodney W. Grimes sin->sin_family = AF_INET; 922df8bae1dSRodney W. Grimes sin->sin_len = sizeof(*sin); 923df8bae1dSRodney W. Grimes sin->sin_addr = dst; 924df8bae1dSRodney W. Grimes 9252c17fe93SGarrett Wollman rtalloc_ign(&ipforward_rt, RTF_PRCLONING); 926df8bae1dSRodney W. Grimes } 927df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0) 928df8bae1dSRodney W. Grimes return ((struct in_ifaddr *)0); 929df8bae1dSRodney W. Grimes return ((struct in_ifaddr *) ipforward_rt.ro_rt->rt_ifa); 930df8bae1dSRodney W. Grimes } 931df8bae1dSRodney W. Grimes 932df8bae1dSRodney W. Grimes /* 933df8bae1dSRodney W. Grimes * Save incoming source route for use in replies, 934df8bae1dSRodney W. Grimes * to be picked up later by ip_srcroute if the receiver is interested. 935df8bae1dSRodney W. Grimes */ 936df8bae1dSRodney W. Grimes void 937df8bae1dSRodney W. Grimes save_rte(option, dst) 938df8bae1dSRodney W. Grimes u_char *option; 939df8bae1dSRodney W. Grimes struct in_addr dst; 940df8bae1dSRodney W. Grimes { 941df8bae1dSRodney W. Grimes unsigned olen; 942df8bae1dSRodney W. Grimes 943df8bae1dSRodney W. Grimes olen = option[IPOPT_OLEN]; 944df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 945df8bae1dSRodney W. Grimes if (ipprintfs) 946df8bae1dSRodney W. Grimes printf("save_rte: olen %d\n", olen); 947df8bae1dSRodney W. Grimes #endif 948df8bae1dSRodney W. Grimes if (olen > sizeof(ip_srcrt) - (1 + sizeof(dst))) 949df8bae1dSRodney W. Grimes return; 95094a5d9b6SDavid Greenman (void)memcpy(ip_srcrt.srcopt, option, olen); 951df8bae1dSRodney W. Grimes ip_nhops = (olen - IPOPT_OFFSET - 1) / sizeof(struct in_addr); 952df8bae1dSRodney W. Grimes ip_srcrt.dst = dst; 953df8bae1dSRodney W. Grimes } 954df8bae1dSRodney W. Grimes 955df8bae1dSRodney W. Grimes /* 956df8bae1dSRodney W. Grimes * Retrieve incoming source route for use in replies, 957df8bae1dSRodney W. Grimes * in the same form used by setsockopt. 958df8bae1dSRodney W. Grimes * The first hop is placed before the options, will be removed later. 959df8bae1dSRodney W. Grimes */ 960df8bae1dSRodney W. Grimes struct mbuf * 961df8bae1dSRodney W. Grimes ip_srcroute() 962df8bae1dSRodney W. Grimes { 963df8bae1dSRodney W. Grimes register struct in_addr *p, *q; 964df8bae1dSRodney W. Grimes register struct mbuf *m; 965df8bae1dSRodney W. Grimes 966df8bae1dSRodney W. Grimes if (ip_nhops == 0) 967df8bae1dSRodney W. Grimes return ((struct mbuf *)0); 968df8bae1dSRodney W. Grimes m = m_get(M_DONTWAIT, MT_SOOPTS); 969df8bae1dSRodney W. Grimes if (m == 0) 970df8bae1dSRodney W. Grimes return ((struct mbuf *)0); 971df8bae1dSRodney W. Grimes 972df8bae1dSRodney W. Grimes #define OPTSIZ (sizeof(ip_srcrt.nop) + sizeof(ip_srcrt.srcopt)) 973df8bae1dSRodney W. Grimes 974df8bae1dSRodney W. Grimes /* length is (nhops+1)*sizeof(addr) + sizeof(nop + srcrt header) */ 975df8bae1dSRodney W. Grimes m->m_len = ip_nhops * sizeof(struct in_addr) + sizeof(struct in_addr) + 976df8bae1dSRodney W. Grimes OPTSIZ; 977df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 978df8bae1dSRodney W. Grimes if (ipprintfs) 979df8bae1dSRodney W. Grimes printf("ip_srcroute: nhops %d mlen %d", ip_nhops, m->m_len); 980df8bae1dSRodney W. Grimes #endif 981df8bae1dSRodney W. Grimes 982df8bae1dSRodney W. Grimes /* 983df8bae1dSRodney W. Grimes * First save first hop for return route 984df8bae1dSRodney W. Grimes */ 985df8bae1dSRodney W. Grimes p = &ip_srcrt.route[ip_nhops - 1]; 986df8bae1dSRodney W. Grimes *(mtod(m, struct in_addr *)) = *p--; 987df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 988df8bae1dSRodney W. Grimes if (ipprintfs) 989df8bae1dSRodney W. Grimes printf(" hops %lx", ntohl(mtod(m, struct in_addr *)->s_addr)); 990df8bae1dSRodney W. Grimes #endif 991df8bae1dSRodney W. Grimes 992df8bae1dSRodney W. Grimes /* 993df8bae1dSRodney W. Grimes * Copy option fields and padding (nop) to mbuf. 994df8bae1dSRodney W. Grimes */ 995df8bae1dSRodney W. Grimes ip_srcrt.nop = IPOPT_NOP; 996df8bae1dSRodney W. Grimes ip_srcrt.srcopt[IPOPT_OFFSET] = IPOPT_MINOFF; 99794a5d9b6SDavid Greenman (void)memcpy(mtod(m, caddr_t) + sizeof(struct in_addr), 99894a5d9b6SDavid Greenman &ip_srcrt.nop, OPTSIZ); 999df8bae1dSRodney W. Grimes q = (struct in_addr *)(mtod(m, caddr_t) + 1000df8bae1dSRodney W. Grimes sizeof(struct in_addr) + OPTSIZ); 1001df8bae1dSRodney W. Grimes #undef OPTSIZ 1002df8bae1dSRodney W. Grimes /* 1003df8bae1dSRodney W. Grimes * Record return path as an IP source route, 1004df8bae1dSRodney W. Grimes * reversing the path (pointers are now aligned). 1005df8bae1dSRodney W. Grimes */ 1006df8bae1dSRodney W. Grimes while (p >= ip_srcrt.route) { 1007df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1008df8bae1dSRodney W. Grimes if (ipprintfs) 1009df8bae1dSRodney W. Grimes printf(" %lx", ntohl(q->s_addr)); 1010df8bae1dSRodney W. Grimes #endif 1011df8bae1dSRodney W. Grimes *q++ = *p--; 1012df8bae1dSRodney W. Grimes } 1013df8bae1dSRodney W. Grimes /* 1014df8bae1dSRodney W. Grimes * Last hop goes to final destination. 1015df8bae1dSRodney W. Grimes */ 1016df8bae1dSRodney W. Grimes *q = ip_srcrt.dst; 1017df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1018df8bae1dSRodney W. Grimes if (ipprintfs) 1019df8bae1dSRodney W. Grimes printf(" %lx\n", ntohl(q->s_addr)); 1020df8bae1dSRodney W. Grimes #endif 1021df8bae1dSRodney W. Grimes return (m); 1022df8bae1dSRodney W. Grimes } 1023df8bae1dSRodney W. Grimes 1024df8bae1dSRodney W. Grimes /* 1025df8bae1dSRodney W. Grimes * Strip out IP options, at higher 1026df8bae1dSRodney W. Grimes * level protocol in the kernel. 1027df8bae1dSRodney W. Grimes * Second argument is buffer to which options 1028df8bae1dSRodney W. Grimes * will be moved, and return value is their length. 1029df8bae1dSRodney W. Grimes * XXX should be deleted; last arg currently ignored. 1030df8bae1dSRodney W. Grimes */ 1031df8bae1dSRodney W. Grimes void 1032df8bae1dSRodney W. Grimes ip_stripoptions(m, mopt) 1033df8bae1dSRodney W. Grimes register struct mbuf *m; 1034df8bae1dSRodney W. Grimes struct mbuf *mopt; 1035df8bae1dSRodney W. Grimes { 1036df8bae1dSRodney W. Grimes register int i; 1037df8bae1dSRodney W. Grimes struct ip *ip = mtod(m, struct ip *); 1038df8bae1dSRodney W. Grimes register caddr_t opts; 1039df8bae1dSRodney W. Grimes int olen; 1040df8bae1dSRodney W. Grimes 1041df8bae1dSRodney W. Grimes olen = (ip->ip_hl<<2) - sizeof (struct ip); 1042df8bae1dSRodney W. Grimes opts = (caddr_t)(ip + 1); 1043df8bae1dSRodney W. Grimes i = m->m_len - (sizeof (struct ip) + olen); 1044df8bae1dSRodney W. Grimes bcopy(opts + olen, opts, (unsigned)i); 1045df8bae1dSRodney W. Grimes m->m_len -= olen; 1046df8bae1dSRodney W. Grimes if (m->m_flags & M_PKTHDR) 1047df8bae1dSRodney W. Grimes m->m_pkthdr.len -= olen; 1048df8bae1dSRodney W. Grimes ip->ip_hl = sizeof(struct ip) >> 2; 1049df8bae1dSRodney W. Grimes } 1050df8bae1dSRodney W. Grimes 1051df8bae1dSRodney W. Grimes u_char inetctlerrmap[PRC_NCMDS] = { 1052df8bae1dSRodney W. Grimes 0, 0, 0, 0, 1053df8bae1dSRodney W. Grimes 0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, 1054df8bae1dSRodney W. Grimes EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, 1055df8bae1dSRodney W. Grimes EMSGSIZE, EHOSTUNREACH, 0, 0, 1056df8bae1dSRodney W. Grimes 0, 0, 0, 0, 1057df8bae1dSRodney W. Grimes ENOPROTOOPT 1058df8bae1dSRodney W. Grimes }; 1059df8bae1dSRodney W. Grimes 1060df8bae1dSRodney W. Grimes /* 1061df8bae1dSRodney W. Grimes * Forward a packet. If some error occurs return the sender 1062df8bae1dSRodney W. Grimes * an icmp packet. Note we can't always generate a meaningful 1063df8bae1dSRodney W. Grimes * icmp message because icmp doesn't have a large enough repertoire 1064df8bae1dSRodney W. Grimes * of codes and types. 1065df8bae1dSRodney W. Grimes * 1066df8bae1dSRodney W. Grimes * If not forwarding, just drop the packet. This could be confusing 1067df8bae1dSRodney W. Grimes * if ipforwarding was zero but some routing protocol was advancing 1068df8bae1dSRodney W. Grimes * us as a gateway to somewhere. However, we must let the routing 1069df8bae1dSRodney W. Grimes * protocol deal with that. 1070df8bae1dSRodney W. Grimes * 1071df8bae1dSRodney W. Grimes * The srcrt parameter indicates whether the packet is being forwarded 1072df8bae1dSRodney W. Grimes * via a source route. 1073df8bae1dSRodney W. Grimes */ 10740312fbe9SPoul-Henning Kamp static void 1075df8bae1dSRodney W. Grimes ip_forward(m, srcrt) 1076df8bae1dSRodney W. Grimes struct mbuf *m; 1077df8bae1dSRodney W. Grimes int srcrt; 1078df8bae1dSRodney W. Grimes { 1079df8bae1dSRodney W. Grimes register struct ip *ip = mtod(m, struct ip *); 1080df8bae1dSRodney W. Grimes register struct sockaddr_in *sin; 1081df8bae1dSRodney W. Grimes register struct rtentry *rt; 108226f9a767SRodney W. Grimes int error, type = 0, code = 0; 1083df8bae1dSRodney W. Grimes struct mbuf *mcopy; 1084df8bae1dSRodney W. Grimes n_long dest; 1085df8bae1dSRodney W. Grimes struct ifnet *destifp; 1086df8bae1dSRodney W. Grimes 1087df8bae1dSRodney W. Grimes dest = 0; 1088df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1089df8bae1dSRodney W. Grimes if (ipprintfs) 109061ce519bSPoul-Henning Kamp printf("forward: src %lx dst %lx ttl %x\n", 1091623ae52eSPoul-Henning Kamp ip->ip_src.s_addr, ip->ip_dst.s_addr, ip->ip_ttl); 1092df8bae1dSRodney W. Grimes #endif 1093100ba1a6SJordan K. Hubbard 1094100ba1a6SJordan K. Hubbard 1095df8bae1dSRodney W. Grimes if (m->m_flags & M_BCAST || in_canforward(ip->ip_dst) == 0) { 1096df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 1097df8bae1dSRodney W. Grimes m_freem(m); 1098df8bae1dSRodney W. Grimes return; 1099df8bae1dSRodney W. Grimes } 1100df8bae1dSRodney W. Grimes HTONS(ip->ip_id); 1101df8bae1dSRodney W. Grimes if (ip->ip_ttl <= IPTTLDEC) { 1102df8bae1dSRodney W. Grimes icmp_error(m, ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS, dest, 0); 1103df8bae1dSRodney W. Grimes return; 1104df8bae1dSRodney W. Grimes } 1105df8bae1dSRodney W. Grimes ip->ip_ttl -= IPTTLDEC; 1106df8bae1dSRodney W. Grimes 1107df8bae1dSRodney W. Grimes sin = (struct sockaddr_in *)&ipforward_rt.ro_dst; 1108df8bae1dSRodney W. Grimes if ((rt = ipforward_rt.ro_rt) == 0 || 1109df8bae1dSRodney W. Grimes ip->ip_dst.s_addr != sin->sin_addr.s_addr) { 1110df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) { 1111df8bae1dSRodney W. Grimes RTFREE(ipforward_rt.ro_rt); 1112df8bae1dSRodney W. Grimes ipforward_rt.ro_rt = 0; 1113df8bae1dSRodney W. Grimes } 1114df8bae1dSRodney W. Grimes sin->sin_family = AF_INET; 1115df8bae1dSRodney W. Grimes sin->sin_len = sizeof(*sin); 1116df8bae1dSRodney W. Grimes sin->sin_addr = ip->ip_dst; 1117df8bae1dSRodney W. Grimes 11182c17fe93SGarrett Wollman rtalloc_ign(&ipforward_rt, RTF_PRCLONING); 1119df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt == 0) { 1120df8bae1dSRodney W. Grimes icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, dest, 0); 1121df8bae1dSRodney W. Grimes return; 1122df8bae1dSRodney W. Grimes } 1123df8bae1dSRodney W. Grimes rt = ipforward_rt.ro_rt; 1124df8bae1dSRodney W. Grimes } 1125df8bae1dSRodney W. Grimes 1126df8bae1dSRodney W. Grimes /* 1127df8bae1dSRodney W. Grimes * Save at most 64 bytes of the packet in case 1128df8bae1dSRodney W. Grimes * we need to generate an ICMP message to the src. 1129df8bae1dSRodney W. Grimes */ 1130df8bae1dSRodney W. Grimes mcopy = m_copy(m, 0, imin((int)ip->ip_len, 64)); 1131df8bae1dSRodney W. Grimes 1132df8bae1dSRodney W. Grimes /* 1133df8bae1dSRodney W. Grimes * If forwarding packet using same interface that it came in on, 1134df8bae1dSRodney W. Grimes * perhaps should send a redirect to sender to shortcut a hop. 1135df8bae1dSRodney W. Grimes * Only send redirect if source is sending directly to us, 1136df8bae1dSRodney W. Grimes * and if packet was not source routed (or has any options). 1137df8bae1dSRodney W. Grimes * Also, don't send redirect if forwarding using a default route 1138df8bae1dSRodney W. Grimes * or a route modified by a redirect. 1139df8bae1dSRodney W. Grimes */ 1140df8bae1dSRodney W. Grimes #define satosin(sa) ((struct sockaddr_in *)(sa)) 1141df8bae1dSRodney W. Grimes if (rt->rt_ifp == m->m_pkthdr.rcvif && 1142df8bae1dSRodney W. Grimes (rt->rt_flags & (RTF_DYNAMIC|RTF_MODIFIED)) == 0 && 1143df8bae1dSRodney W. Grimes satosin(rt_key(rt))->sin_addr.s_addr != 0 && 1144df8bae1dSRodney W. Grimes ipsendredirects && !srcrt) { 1145df8bae1dSRodney W. Grimes #define RTA(rt) ((struct in_ifaddr *)(rt->rt_ifa)) 1146df8bae1dSRodney W. Grimes u_long src = ntohl(ip->ip_src.s_addr); 1147df8bae1dSRodney W. Grimes 1148df8bae1dSRodney W. Grimes if (RTA(rt) && 1149df8bae1dSRodney W. Grimes (src & RTA(rt)->ia_subnetmask) == RTA(rt)->ia_subnet) { 1150df8bae1dSRodney W. Grimes if (rt->rt_flags & RTF_GATEWAY) 1151df8bae1dSRodney W. Grimes dest = satosin(rt->rt_gateway)->sin_addr.s_addr; 1152df8bae1dSRodney W. Grimes else 1153df8bae1dSRodney W. Grimes dest = ip->ip_dst.s_addr; 1154df8bae1dSRodney W. Grimes /* Router requirements says to only send host redirects */ 1155df8bae1dSRodney W. Grimes type = ICMP_REDIRECT; 1156df8bae1dSRodney W. Grimes code = ICMP_REDIRECT_HOST; 1157df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC 1158df8bae1dSRodney W. Grimes if (ipprintfs) 1159df8bae1dSRodney W. Grimes printf("redirect (%d) to %lx\n", code, (u_long)dest); 1160df8bae1dSRodney W. Grimes #endif 1161df8bae1dSRodney W. Grimes } 1162df8bae1dSRodney W. Grimes } 1163df8bae1dSRodney W. Grimes 1164b97d15cbSGarrett Wollman error = ip_output(m, (struct mbuf *)0, &ipforward_rt, 1165b97d15cbSGarrett Wollman IP_FORWARDING, 0); 1166df8bae1dSRodney W. Grimes if (error) 1167df8bae1dSRodney W. Grimes ipstat.ips_cantforward++; 1168df8bae1dSRodney W. Grimes else { 1169df8bae1dSRodney W. Grimes ipstat.ips_forward++; 1170df8bae1dSRodney W. Grimes if (type) 1171df8bae1dSRodney W. Grimes ipstat.ips_redirectsent++; 1172df8bae1dSRodney W. Grimes else { 1173df8bae1dSRodney W. Grimes if (mcopy) 1174df8bae1dSRodney W. Grimes m_freem(mcopy); 1175df8bae1dSRodney W. Grimes return; 1176df8bae1dSRodney W. Grimes } 1177df8bae1dSRodney W. Grimes } 1178df8bae1dSRodney W. Grimes if (mcopy == NULL) 1179df8bae1dSRodney W. Grimes return; 1180df8bae1dSRodney W. Grimes destifp = NULL; 1181df8bae1dSRodney W. Grimes 1182df8bae1dSRodney W. Grimes switch (error) { 1183df8bae1dSRodney W. Grimes 1184df8bae1dSRodney W. Grimes case 0: /* forwarded, but need redirect */ 1185df8bae1dSRodney W. Grimes /* type, code set above */ 1186df8bae1dSRodney W. Grimes break; 1187df8bae1dSRodney W. Grimes 1188df8bae1dSRodney W. Grimes case ENETUNREACH: /* shouldn't happen, checked above */ 1189df8bae1dSRodney W. Grimes case EHOSTUNREACH: 1190df8bae1dSRodney W. Grimes case ENETDOWN: 1191df8bae1dSRodney W. Grimes case EHOSTDOWN: 1192df8bae1dSRodney W. Grimes default: 1193df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 1194df8bae1dSRodney W. Grimes code = ICMP_UNREACH_HOST; 1195df8bae1dSRodney W. Grimes break; 1196df8bae1dSRodney W. Grimes 1197df8bae1dSRodney W. Grimes case EMSGSIZE: 1198df8bae1dSRodney W. Grimes type = ICMP_UNREACH; 1199df8bae1dSRodney W. Grimes code = ICMP_UNREACH_NEEDFRAG; 1200df8bae1dSRodney W. Grimes if (ipforward_rt.ro_rt) 1201df8bae1dSRodney W. Grimes destifp = ipforward_rt.ro_rt->rt_ifp; 1202df8bae1dSRodney W. Grimes ipstat.ips_cantfrag++; 1203df8bae1dSRodney W. Grimes break; 1204df8bae1dSRodney W. Grimes 1205df8bae1dSRodney W. Grimes case ENOBUFS: 1206df8bae1dSRodney W. Grimes type = ICMP_SOURCEQUENCH; 1207df8bae1dSRodney W. Grimes code = 0; 1208df8bae1dSRodney W. Grimes break; 1209df8bae1dSRodney W. Grimes } 1210df8bae1dSRodney W. Grimes icmp_error(mcopy, type, code, dest, destifp); 1211df8bae1dSRodney W. Grimes } 1212df8bae1dSRodney W. Grimes 1213df8bae1dSRodney W. Grimes int 1214f0068c4aSGarrett Wollman ip_rsvp_init(struct socket *so) 1215f0068c4aSGarrett Wollman { 1216f0068c4aSGarrett Wollman if (so->so_type != SOCK_RAW || 1217f0068c4aSGarrett Wollman so->so_proto->pr_protocol != IPPROTO_RSVP) 1218f0068c4aSGarrett Wollman return EOPNOTSUPP; 1219f0068c4aSGarrett Wollman 1220f0068c4aSGarrett Wollman if (ip_rsvpd != NULL) 1221f0068c4aSGarrett Wollman return EADDRINUSE; 1222f0068c4aSGarrett Wollman 1223f0068c4aSGarrett Wollman ip_rsvpd = so; 12241c5de19aSGarrett Wollman /* 12251c5de19aSGarrett Wollman * This may seem silly, but we need to be sure we don't over-increment 12261c5de19aSGarrett Wollman * the RSVP counter, in case something slips up. 12271c5de19aSGarrett Wollman */ 12281c5de19aSGarrett Wollman if (!ip_rsvp_on) { 12291c5de19aSGarrett Wollman ip_rsvp_on = 1; 12301c5de19aSGarrett Wollman rsvp_on++; 12311c5de19aSGarrett Wollman } 1232f0068c4aSGarrett Wollman 1233f0068c4aSGarrett Wollman return 0; 1234f0068c4aSGarrett Wollman } 1235f0068c4aSGarrett Wollman 1236f0068c4aSGarrett Wollman int 1237f0068c4aSGarrett Wollman ip_rsvp_done(void) 1238f0068c4aSGarrett Wollman { 1239f0068c4aSGarrett Wollman ip_rsvpd = NULL; 12401c5de19aSGarrett Wollman /* 12411c5de19aSGarrett Wollman * This may seem silly, but we need to be sure we don't over-decrement 12421c5de19aSGarrett Wollman * the RSVP counter, in case something slips up. 12431c5de19aSGarrett Wollman */ 12441c5de19aSGarrett Wollman if (ip_rsvp_on) { 12451c5de19aSGarrett Wollman ip_rsvp_on = 0; 12461c5de19aSGarrett Wollman rsvp_on--; 12471c5de19aSGarrett Wollman } 1248f0068c4aSGarrett Wollman return 0; 1249f0068c4aSGarrett Wollman } 1250