2003-12-07 02:56:10 +03:00
|
|
|
/* $NetBSD: ip_input.c,v 1.190 2003/12/06 23:56:10 jonathan Exp $ */
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
1998-12-19 05:46:12 +03:00
|
|
|
|
|
|
|
/*-
|
|
|
|
* Copyright (c) 1998 The NetBSD Foundation, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
* by Public Access Networks Corporation ("Panix"). It was developed under
|
|
|
|
* contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the NetBSD
|
|
|
|
* Foundation, Inc. and its contributors.
|
|
|
|
* 4. Neither the name of The NetBSD Foundation nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* Copyright (c) 1982, 1986, 1988, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1993-03-21 12:45:37 +03:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1994-06-29 10:29:24 +04:00
|
|
|
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
2001-11-13 03:32:34 +03:00
|
|
|
#include <sys/cdefs.h>
|
2003-12-07 02:56:10 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.190 2003/12/06 23:56:10 jonathan Exp $");
|
2001-11-13 03:32:34 +03:00
|
|
|
|
2003-11-19 21:39:34 +03:00
|
|
|
#include "opt_inet.h"
|
1998-04-30 00:45:30 +04:00
|
|
|
#include "opt_gateway.h"
|
1998-08-09 12:58:18 +04:00
|
|
|
#include "opt_pfil_hooks.h"
|
1999-07-10 02:57:15 +04:00
|
|
|
#include "opt_ipsec.h"
|
1998-01-12 06:02:48 +03:00
|
|
|
#include "opt_mrouting.h"
|
2003-06-23 15:00:59 +04:00
|
|
|
#include "opt_mbuftrace.h"
|
2001-06-02 20:17:09 +04:00
|
|
|
#include "opt_inet_csum.h"
|
1998-01-12 06:02:48 +03:00
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/domain.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
1997-01-11 08:21:07 +03:00
|
|
|
#include <sys/socketvar.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/kernel.h>
|
1998-10-08 05:19:25 +04:00
|
|
|
#include <sys/pool.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <sys/sysctl.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <net/if.h>
|
1997-01-11 08:21:07 +03:00
|
|
|
#include <net/if_dl.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <net/route.h>
|
1997-02-18 23:49:32 +03:00
|
|
|
#include <net/pfil.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/in_pcb.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/ip_var.h>
|
|
|
|
#include <netinet/ip_icmp.h>
|
1999-07-01 12:12:45 +04:00
|
|
|
/* just for gif_ttl */
|
|
|
|
#include <netinet/in_gif.h>
|
|
|
|
#include "gif.h"
|
2002-02-24 20:22:20 +03:00
|
|
|
#include <net/if_gre.h>
|
|
|
|
#include "gre.h"
|
1999-07-01 12:12:45 +04:00
|
|
|
|
2000-03-31 18:27:17 +04:00
|
|
|
#ifdef MROUTING
|
|
|
|
#include <netinet/ip_mroute.h>
|
|
|
|
#endif
|
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
#include <netinet6/ipsec.h>
|
|
|
|
#include <netkey/key.h>
|
|
|
|
#endif
|
2003-08-15 07:42:00 +04:00
|
|
|
#ifdef FAST_IPSEC
|
|
|
|
#include <netipsec/ipsec.h>
|
|
|
|
#include <netipsec/key.h>
|
|
|
|
#endif /* FAST_IPSEC*/
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
#ifndef IPFORWARDING
|
|
|
|
#ifdef GATEWAY
|
|
|
|
#define IPFORWARDING 1 /* forward IP packets not for us */
|
|
|
|
#else /* GATEWAY */
|
|
|
|
#define IPFORWARDING 0 /* don't forward IP packets not for us */
|
|
|
|
#endif /* GATEWAY */
|
|
|
|
#endif /* IPFORWARDING */
|
|
|
|
#ifndef IPSENDREDIRECTS
|
|
|
|
#define IPSENDREDIRECTS 1
|
|
|
|
#endif
|
1996-01-16 00:11:46 +03:00
|
|
|
#ifndef IPFORWSRCRT
|
1997-02-25 11:35:41 +03:00
|
|
|
#define IPFORWSRCRT 1 /* forward source-routed packets */
|
|
|
|
#endif
|
|
|
|
#ifndef IPALLOWSRCRT
|
1997-02-26 07:09:32 +03:00
|
|
|
#define IPALLOWSRCRT 1 /* allow source-routed packets */
|
1996-01-16 00:11:46 +03:00
|
|
|
#endif
|
1997-10-19 01:18:28 +04:00
|
|
|
#ifndef IPMTUDISC
|
2002-06-13 20:25:54 +04:00
|
|
|
#define IPMTUDISC 1
|
1997-10-19 01:18:28 +04:00
|
|
|
#endif
|
1998-04-29 07:44:11 +04:00
|
|
|
#ifndef IPMTUDISCTIMEOUT
|
1998-04-29 07:45:52 +04:00
|
|
|
#define IPMTUDISCTIMEOUT (10 * 60) /* as per RFC 1191 */
|
1998-04-29 07:44:11 +04:00
|
|
|
#endif
|
1997-10-19 01:18:28 +04:00
|
|
|
|
1996-01-16 07:17:30 +03:00
|
|
|
/*
|
|
|
|
* Note: DIRECTED_BROADCAST is handled this way so that previous
|
|
|
|
* configuration using this option will Just Work.
|
|
|
|
*/
|
|
|
|
#ifndef IPDIRECTEDBCAST
|
|
|
|
#ifdef DIRECTED_BROADCAST
|
|
|
|
#define IPDIRECTEDBCAST 1
|
|
|
|
#else
|
|
|
|
#define IPDIRECTEDBCAST 0
|
|
|
|
#endif /* DIRECTED_BROADCAST */
|
|
|
|
#endif /* IPDIRECTEDBCAST */
|
1993-03-21 12:45:37 +03:00
|
|
|
int ipforwarding = IPFORWARDING;
|
|
|
|
int ipsendredirects = IPSENDREDIRECTS;
|
1994-05-13 10:02:48 +04:00
|
|
|
int ip_defttl = IPDEFTTL;
|
1996-01-16 00:11:46 +03:00
|
|
|
int ip_forwsrcrt = IPFORWSRCRT;
|
1996-01-16 07:17:30 +03:00
|
|
|
int ip_directedbcast = IPDIRECTEDBCAST;
|
1997-02-25 11:35:41 +03:00
|
|
|
int ip_allowsrcrt = IPALLOWSRCRT;
|
1997-10-19 01:18:28 +04:00
|
|
|
int ip_mtudisc = IPMTUDISC;
|
2002-09-11 06:41:19 +04:00
|
|
|
int ip_mtudisc_timeout = IPMTUDISCTIMEOUT;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
int ipprintfs = 0;
|
|
|
|
#endif
|
2003-11-19 21:39:34 +03:00
|
|
|
|
|
|
|
int ip_do_randomid = 0;
|
|
|
|
|
2003-04-11 23:41:37 +04:00
|
|
|
/*
|
|
|
|
* XXX - Setting ip_checkinterface mostly implements the receive side of
|
|
|
|
* the Strong ES model described in RFC 1122, but since the routing table
|
|
|
|
* and transmit implementation do not implement the Strong ES model,
|
|
|
|
* setting this to 1 results in an odd hybrid.
|
|
|
|
*
|
|
|
|
* XXX - ip_checkinterface currently must be disabled if you use ipnat
|
|
|
|
* to translate the destination address to another local interface.
|
|
|
|
*
|
|
|
|
* XXX - ip_checkinterface must be disabled if you add IP aliases
|
|
|
|
* to the loopback interface instead of the interface where the
|
|
|
|
* packets for those addresses are received.
|
|
|
|
*/
|
|
|
|
int ip_checkinterface = 0;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1998-04-29 07:44:11 +04:00
|
|
|
struct rttimer_queue *ip_mtudisc_timeout_q = NULL;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
extern struct domain inetdomain;
|
|
|
|
int ipqmaxlen = IFQ_MAXLEN;
|
2002-05-13 00:33:50 +04:00
|
|
|
u_long in_ifaddrhash; /* size of hash table - 1 */
|
|
|
|
int in_ifaddrentries; /* total number of addrs */
|
2003-11-11 23:25:26 +03:00
|
|
|
struct in_ifaddrhead in_ifaddrhead;
|
1998-02-13 21:21:38 +03:00
|
|
|
struct in_ifaddrhashhead *in_ifaddrhashtbl;
|
2003-06-15 06:49:32 +04:00
|
|
|
u_long in_multihash; /* size of hash table - 1 */
|
|
|
|
int in_multientries; /* total number of addrs */
|
|
|
|
struct in_multihashhead *in_multihashtbl;
|
1994-05-13 10:02:48 +04:00
|
|
|
struct ifqueue ipintrq;
|
1998-04-30 01:37:52 +04:00
|
|
|
struct ipstat ipstat;
|
2003-11-18 01:34:16 +03:00
|
|
|
uint16_t ip_id;
|
1998-12-19 00:35:11 +03:00
|
|
|
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
struct pfil_head inet_pfil_hook;
|
|
|
|
#endif
|
|
|
|
|
2003-12-07 02:56:10 +03:00
|
|
|
/* IP datagram reassembly queues (hashed) */
|
|
|
|
#define IPREASS_NHASH_LOG2 6
|
|
|
|
#define IPREASS_NHASH (1 << IPREASS_NHASH_LOG2)
|
|
|
|
#define IPREASS_HMASK (IPREASS_NHASH - 1)
|
|
|
|
#define IPREASS_HASH(x,y) \
|
|
|
|
(((((x) & 0xF) | ((((x) >> 8) & 0xF) << 4)) ^ (y)) & IPREASS_HMASK)
|
|
|
|
struct ipqhead ipq[IPREASS_NHASH];
|
|
|
|
#ifdef notyet
|
|
|
|
static int nipq = 0; /* total # of reass queues */
|
|
|
|
#endif
|
1998-12-19 00:35:11 +03:00
|
|
|
int ipq_locked;
|
2001-03-27 06:24:38 +04:00
|
|
|
int ip_nfragpackets = 0;
|
2001-04-16 21:03:33 +04:00
|
|
|
int ip_maxfragpackets = 200;
|
1998-12-19 00:35:11 +03:00
|
|
|
|
|
|
|
static __inline int ipq_lock_try __P((void));
|
|
|
|
static __inline void ipq_unlock __P((void));
|
|
|
|
|
|
|
|
static __inline int
|
|
|
|
ipq_lock_try()
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
|
2001-04-14 03:29:55 +04:00
|
|
|
/*
|
2002-05-12 19:48:36 +04:00
|
|
|
* Use splvm() -- we're blocking things that would cause
|
2001-04-14 03:29:55 +04:00
|
|
|
* mbuf allocation.
|
|
|
|
*/
|
|
|
|
s = splvm();
|
1998-12-19 00:35:11 +03:00
|
|
|
if (ipq_locked) {
|
|
|
|
splx(s);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
ipq_locked = 1;
|
|
|
|
splx(s);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline void
|
|
|
|
ipq_unlock()
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
|
2001-04-14 03:29:55 +04:00
|
|
|
s = splvm();
|
1998-12-19 00:35:11 +03:00
|
|
|
ipq_locked = 0;
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
#define IPQ_LOCK() \
|
|
|
|
do { \
|
|
|
|
if (ipq_lock_try() == 0) { \
|
|
|
|
printf("%s:%d: ipq already locked\n", __FILE__, __LINE__); \
|
|
|
|
panic("ipq_lock"); \
|
|
|
|
} \
|
2002-11-02 10:20:42 +03:00
|
|
|
} while (/*CONSTCOND*/ 0)
|
1998-12-19 00:35:11 +03:00
|
|
|
#define IPQ_LOCK_CHECK() \
|
|
|
|
do { \
|
|
|
|
if (ipq_locked == 0) { \
|
|
|
|
printf("%s:%d: ipq lock not held\n", __FILE__, __LINE__); \
|
|
|
|
panic("ipq lock check"); \
|
|
|
|
} \
|
2002-11-02 10:20:42 +03:00
|
|
|
} while (/*CONSTCOND*/ 0)
|
1998-12-19 00:35:11 +03:00
|
|
|
#else
|
|
|
|
#define IPQ_LOCK() (void) ipq_lock_try()
|
|
|
|
#define IPQ_LOCK_CHECK() /* nothing */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define IPQ_UNLOCK() ipq_unlock()
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-06-15 06:49:32 +04:00
|
|
|
struct pool inmulti_pool;
|
1998-10-08 05:19:25 +04:00
|
|
|
struct pool ipqent_pool;
|
|
|
|
|
2001-06-02 20:17:09 +04:00
|
|
|
#ifdef INET_CSUM_COUNTERS
|
|
|
|
#include <sys/device.h>
|
|
|
|
|
|
|
|
struct evcnt ip_hwcsum_bad = EVCNT_INITIALIZER(EVCNT_TYPE_MISC,
|
|
|
|
NULL, "inet", "hwcsum bad");
|
|
|
|
struct evcnt ip_hwcsum_ok = EVCNT_INITIALIZER(EVCNT_TYPE_MISC,
|
|
|
|
NULL, "inet", "hwcsum ok");
|
|
|
|
struct evcnt ip_swcsum = EVCNT_INITIALIZER(EVCNT_TYPE_MISC,
|
|
|
|
NULL, "inet", "swcsum");
|
|
|
|
|
|
|
|
#define INET_CSUM_COUNTER_INCR(ev) (ev)->ev_count++
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
#define INET_CSUM_COUNTER_INCR(ev) /* nothing */
|
|
|
|
|
|
|
|
#endif /* INET_CSUM_COUNTERS */
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* We need to save the IP options in case a protocol wants to respond
|
|
|
|
* to an incoming packet over the same route if the packet got here
|
|
|
|
* using IP source routing. This allows connection establishment and
|
|
|
|
* maintenance when the remote end is on a network that is not known
|
|
|
|
* to us.
|
|
|
|
*/
|
|
|
|
int ip_nhops = 0;
|
|
|
|
static struct ip_srcrt {
|
|
|
|
struct in_addr dst; /* final destination */
|
|
|
|
char nop; /* one NOP to align */
|
|
|
|
char srcopt[IPOPT_OFFSET + 1]; /* OPTVAL, OLEN and OFFSET */
|
|
|
|
struct in_addr route[MAX_IPOPTLEN/sizeof(struct in_addr)];
|
|
|
|
} ip_srcrt;
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
static void save_rte __P((u_char *, struct in_addr));
|
1996-09-09 18:51:07 +04:00
|
|
|
|
2003-02-26 09:31:08 +03:00
|
|
|
#ifdef MBUFTRACE
|
|
|
|
struct mowner ip_rx_mowner = { "internet", "rx" };
|
|
|
|
struct mowner ip_tx_mowner = { "internet", "tx" };
|
|
|
|
#endif
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* IP initialization: fill in IP protocol switch table.
|
|
|
|
* All protocols not implemented in kernel go to raw IP protocol handler.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_init()
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct protosw *pr;
|
|
|
|
int i;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-06-15 06:49:32 +04:00
|
|
|
pool_init(&inmulti_pool, sizeof(struct in_multi), 0, 0, 0, "inmltpl",
|
|
|
|
NULL);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_init(&ipqent_pool, sizeof(struct ipqent), 0, 0, 0, "ipqepl",
|
2002-03-08 23:48:27 +03:00
|
|
|
NULL);
|
1998-10-08 05:19:25 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW);
|
|
|
|
if (pr == 0)
|
|
|
|
panic("ip_init");
|
|
|
|
for (i = 0; i < IPPROTO_MAX; i++)
|
|
|
|
ip_protox[i] = pr - inetsw;
|
|
|
|
for (pr = inetdomain.dom_protosw;
|
|
|
|
pr < inetdomain.dom_protoswNPROTOSW; pr++)
|
|
|
|
if (pr->pr_domain->dom_family == PF_INET &&
|
|
|
|
pr->pr_protocol && pr->pr_protocol != IPPROTO_RAW)
|
|
|
|
ip_protox[pr->pr_protocol] = pr - inetsw;
|
2003-12-07 02:56:10 +03:00
|
|
|
for (i = 0; i < IPREASS_NHASH; i++)
|
|
|
|
LIST_INIT(&ipq[i]);
|
|
|
|
|
2003-11-18 01:34:16 +03:00
|
|
|
ip_id = time.tv_sec & 0xfffff;
|
1993-03-21 12:45:37 +03:00
|
|
|
ipintrq.ifq_maxlen = ipqmaxlen;
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_INIT(&in_ifaddrhead);
|
2000-11-08 17:28:12 +03:00
|
|
|
in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, M_IFADDR,
|
|
|
|
M_WAITOK, &in_ifaddrhash);
|
2003-06-15 06:49:32 +04:00
|
|
|
in_multihashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, M_IPMADDR,
|
|
|
|
M_WAITOK, &in_multihash);
|
2002-11-10 22:52:16 +03:00
|
|
|
ip_mtudisc_timeout_q = rt_timer_queue_create(ip_mtudisc_timeout);
|
1998-10-08 05:41:45 +04:00
|
|
|
#ifdef GATEWAY
|
|
|
|
ipflow_init();
|
|
|
|
#endif
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
|
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
/* Register our Packet Filter hook. */
|
2000-12-29 00:40:59 +03:00
|
|
|
inet_pfil_hook.ph_type = PFIL_TYPE_AF;
|
|
|
|
inet_pfil_hook.ph_af = AF_INET;
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
i = pfil_head_register(&inet_pfil_hook);
|
|
|
|
if (i != 0)
|
|
|
|
printf("ip_init: WARNING: unable to register pfil hook, "
|
|
|
|
"error %d\n", i);
|
|
|
|
#endif /* PFIL_HOOKS */
|
2001-06-02 20:17:09 +04:00
|
|
|
|
|
|
|
#ifdef INET_CSUM_COUNTERS
|
|
|
|
evcnt_attach_static(&ip_hwcsum_bad);
|
|
|
|
evcnt_attach_static(&ip_hwcsum_ok);
|
|
|
|
evcnt_attach_static(&ip_swcsum);
|
|
|
|
#endif /* INET_CSUM_COUNTERS */
|
2003-02-26 09:31:08 +03:00
|
|
|
|
|
|
|
#ifdef MBUFTRACE
|
|
|
|
MOWNER_ATTACH(&ip_tx_mowner);
|
|
|
|
MOWNER_ATTACH(&ip_rx_mowner);
|
|
|
|
#endif /* MBUFTRACE */
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
struct sockaddr_in ipaddr = { sizeof(ipaddr), AF_INET };
|
|
|
|
struct route ipforward_rt;
|
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
/*
|
|
|
|
* IP software interrupt routine
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ipintr()
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
struct mbuf *m;
|
|
|
|
|
|
|
|
while (1) {
|
2001-04-14 03:29:55 +04:00
|
|
|
s = splnet();
|
1999-07-01 12:12:45 +04:00
|
|
|
IF_DEQUEUE(&ipintrq, m);
|
|
|
|
splx(s);
|
|
|
|
if (m == 0)
|
|
|
|
return;
|
2003-02-26 09:31:08 +03:00
|
|
|
MCLAIM(m, &ip_rx_mowner);
|
1999-07-01 12:12:45 +04:00
|
|
|
ip_input(m);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Ip input routine. Checksum and byte swap header. If fragmented
|
|
|
|
* try to reassemble. Process options. Pass to next level.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1999-07-01 12:12:45 +04:00
|
|
|
ip_input(struct mbuf *m)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *ip = NULL;
|
|
|
|
struct ipq *fp;
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct ifaddr *ifa;
|
1995-11-21 04:07:34 +03:00
|
|
|
struct ipqent *ipqe;
|
1999-07-01 12:12:45 +04:00
|
|
|
int hlen = 0, mff, len;
|
2000-02-16 15:40:40 +03:00
|
|
|
int downmatch;
|
2003-04-11 23:41:37 +04:00
|
|
|
int checkif;
|
2003-06-30 11:54:28 +04:00
|
|
|
int srcrt = 0;
|
2003-12-07 02:56:10 +03:00
|
|
|
u_int hash;
|
2003-08-15 07:42:00 +04:00
|
|
|
#ifdef FAST_IPSEC
|
|
|
|
struct m_tag *mtag;
|
|
|
|
struct tdb_ident *tdbi;
|
|
|
|
struct secpolicy *sp;
|
|
|
|
int s, error;
|
|
|
|
#endif /* FAST_IPSEC */
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-02-26 09:31:08 +03:00
|
|
|
MCLAIM(m, &ip_rx_mowner);
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if ((m->m_flags & M_PKTHDR) == 0)
|
|
|
|
panic("ipintr no HDR");
|
1999-07-01 12:12:45 +04:00
|
|
|
#endif
|
2003-02-26 09:31:08 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* If no IP addresses have been set yet but the interfaces
|
|
|
|
* are receiving, can't do anything with incoming packets yet.
|
|
|
|
*/
|
2003-11-11 23:25:26 +03:00
|
|
|
if (TAILQ_FIRST(&in_ifaddrhead) == 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
|
|
|
ipstat.ips_total++;
|
Changes to allow the IPv4 and IPv6 layers to align headers themseves,
as necessary:
* Implement a new mbuf utility routine, m_copyup(), is is like
m_pullup(), except that it always prepends and copies, rather
than only doing so if the desired length is larger than m->m_len.
m_copyup() also allows an offset into the destination mbuf, which
allows space for packet headers, in the forwarding case.
* Add *_HDR_ALIGNED_P() macros for IP, IPv6, ICMP, and IGMP. These
macros expand to 1 if __NO_STRICT_ALIGNMENT is defined, so that
architectures which do not have strict alignment constraints don't
pay for the test or visit the new align-if-needed path.
* Use the new macros to check if a header needs to be aligned, or to
assert that it already is, as appropriate.
Note: This code is still somewhat experimental. However, the new
code path won't be visited if individual device drivers continue
to guarantee that packets are delivered to layer 3 already properly
aligned (which are rules that are already in use).
2002-07-01 02:40:32 +04:00
|
|
|
/*
|
|
|
|
* If the IP header is not aligned, slurp it up into a new
|
|
|
|
* mbuf with space for link headers, in the event we forward
|
|
|
|
* it. Otherwise, if it is aligned, make sure the entire
|
|
|
|
* base IP header is in the first mbuf of the chain.
|
|
|
|
*/
|
|
|
|
if (IP_HDR_ALIGNED_P(mtod(m, caddr_t)) == 0) {
|
|
|
|
if ((m = m_copyup(m, sizeof(struct ip),
|
|
|
|
(max_linkhdr + 3) & ~3)) == NULL) {
|
|
|
|
/* XXXJRT new stat, please */
|
|
|
|
ipstat.ips_toosmall++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else if (__predict_false(m->m_len < sizeof (struct ip))) {
|
|
|
|
if ((m = m_pullup(m, sizeof (struct ip))) == NULL) {
|
|
|
|
ipstat.ips_toosmall++;
|
|
|
|
return;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
ip = mtod(m, struct ip *);
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ip->ip_v != IPVERSION) {
|
|
|
|
ipstat.ips_badvers++;
|
|
|
|
goto bad;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
hlen = ip->ip_hl << 2;
|
|
|
|
if (hlen < sizeof(struct ip)) { /* minimum header length */
|
|
|
|
ipstat.ips_badhlen++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (hlen > m->m_len) {
|
|
|
|
if ((m = m_pullup(m, hlen)) == 0) {
|
|
|
|
ipstat.ips_badhlen++;
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
}
|
2000-02-12 20:45:44 +03:00
|
|
|
|
1999-05-04 01:14:47 +04:00
|
|
|
/*
|
2000-02-12 21:00:00 +03:00
|
|
|
* RFC1122: packets with a multicast source address are
|
2000-02-12 20:45:44 +03:00
|
|
|
* not allowed.
|
1999-05-04 01:14:47 +04:00
|
|
|
*/
|
|
|
|
if (IN_MULTICAST(ip->ip_src.s_addr)) {
|
2001-03-02 07:26:10 +03:00
|
|
|
ipstat.ips_badaddr++;
|
1999-05-04 01:14:47 +04:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
2001-03-02 05:05:36 +03:00
|
|
|
/* 127/8 must not appear on wire - RFC1122 */
|
|
|
|
if ((ntohl(ip->ip_dst.s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET ||
|
|
|
|
(ntohl(ip->ip_src.s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET) {
|
2001-03-02 07:26:10 +03:00
|
|
|
if ((m->m_pkthdr.rcvif->if_flags & IFF_LOOPBACK) == 0) {
|
|
|
|
ipstat.ips_badaddr++;
|
2001-03-02 05:05:36 +03:00
|
|
|
goto bad;
|
2001-03-02 07:26:10 +03:00
|
|
|
}
|
2001-03-02 05:05:36 +03:00
|
|
|
}
|
|
|
|
|
2001-06-02 20:17:09 +04:00
|
|
|
switch (m->m_pkthdr.csum_flags &
|
2001-09-17 21:26:59 +04:00
|
|
|
((m->m_pkthdr.rcvif->if_csum_flags_rx & M_CSUM_IPv4) |
|
2001-06-02 20:17:09 +04:00
|
|
|
M_CSUM_IPv4_BAD)) {
|
|
|
|
case M_CSUM_IPv4|M_CSUM_IPv4_BAD:
|
|
|
|
INET_CSUM_COUNTER_INCR(&ip_hwcsum_bad);
|
|
|
|
goto badcsum;
|
|
|
|
|
|
|
|
case M_CSUM_IPv4:
|
|
|
|
/* Checksum was okay. */
|
|
|
|
INET_CSUM_COUNTER_INCR(&ip_hwcsum_ok);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
/* Must compute it ourselves. */
|
|
|
|
INET_CSUM_COUNTER_INCR(&ip_swcsum);
|
|
|
|
if (in_cksum(m, hlen) != 0)
|
|
|
|
goto bad;
|
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
/* Retrieve the packet length. */
|
|
|
|
len = ntohs(ip->ip_len);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1999-03-26 11:51:35 +03:00
|
|
|
/*
|
|
|
|
* Check for additional length bogosity
|
|
|
|
*/
|
1999-04-07 09:34:32 +04:00
|
|
|
if (len < hlen) {
|
1999-03-26 11:51:35 +03:00
|
|
|
ipstat.ips_badlen++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Check that the amount of data in the buffers
|
|
|
|
* is as at least much as the IP header would have us expect.
|
|
|
|
* Trim mbufs if longer than we expect.
|
|
|
|
* Drop packet if shorter than we expect.
|
|
|
|
*/
|
1996-09-09 18:51:07 +04:00
|
|
|
if (m->m_pkthdr.len < len) {
|
1993-03-21 12:45:37 +03:00
|
|
|
ipstat.ips_tooshort++;
|
|
|
|
goto bad;
|
|
|
|
}
|
1996-09-09 18:51:07 +04:00
|
|
|
if (m->m_pkthdr.len > len) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (m->m_len == m->m_pkthdr.len) {
|
1996-09-09 18:51:07 +04:00
|
|
|
m->m_len = len;
|
|
|
|
m->m_pkthdr.len = len;
|
1993-03-21 12:45:37 +03:00
|
|
|
} else
|
1996-09-09 18:51:07 +04:00
|
|
|
m_adj(m, len - m->m_pkthdr.len);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
2003-12-04 13:02:35 +03:00
|
|
|
#if defined(IPSEC) || defined(FAST_IPSEC)
|
2002-05-12 19:48:36 +04:00
|
|
|
/* ipflow (IP fast forwarding) is not compatible with IPsec. */
|
1999-10-26 13:53:17 +04:00
|
|
|
m->m_flags &= ~M_CANFASTFWD;
|
|
|
|
#else
|
1998-05-01 07:23:24 +04:00
|
|
|
/*
|
|
|
|
* Assume that we can create a fast-forward IP flow entry
|
|
|
|
* based on this packet.
|
|
|
|
*/
|
|
|
|
m->m_flags |= M_CANFASTFWD;
|
1999-10-26 13:53:17 +04:00
|
|
|
#endif
|
1998-05-01 07:23:24 +04:00
|
|
|
|
1996-09-14 18:40:20 +04:00
|
|
|
#ifdef PFIL_HOOKS
|
1996-09-06 09:07:43 +04:00
|
|
|
/*
|
1998-05-01 07:23:24 +04:00
|
|
|
* Run through list of hooks for input packets. If there are any
|
|
|
|
* filters which require that additional packets in the flow are
|
|
|
|
* not fast-forwarded, they must clear the M_CANFASTFWD flag.
|
|
|
|
* Note that filters must _never_ set this flag, as another filter
|
|
|
|
* in the list may have previously cleared it.
|
1996-09-06 09:07:43 +04:00
|
|
|
*/
|
2001-01-24 12:04:15 +03:00
|
|
|
/*
|
|
|
|
* let ipfilter look at packet on the wire,
|
|
|
|
* not the decapsulated packet.
|
|
|
|
*/
|
|
|
|
#ifdef IPSEC
|
2001-08-06 14:25:00 +04:00
|
|
|
if (!ipsec_getnhist(m))
|
2003-11-24 23:54:59 +03:00
|
|
|
#elif defined(FAST_IPSEC)
|
|
|
|
if (!ipsec_indone(m))
|
2001-01-24 12:04:15 +03:00
|
|
|
#else
|
|
|
|
if (1)
|
|
|
|
#endif
|
|
|
|
{
|
2003-06-30 11:54:28 +04:00
|
|
|
struct in_addr odst;
|
|
|
|
|
|
|
|
odst = ip->ip_dst;
|
2001-01-24 12:04:15 +03:00
|
|
|
if (pfil_run_hooks(&inet_pfil_hook, &m, m->m_pkthdr.rcvif,
|
2003-06-30 05:21:11 +04:00
|
|
|
PFIL_IN) != 0)
|
|
|
|
return;
|
2001-01-24 12:04:15 +03:00
|
|
|
if (m == NULL)
|
|
|
|
return;
|
|
|
|
ip = mtod(m, struct ip *);
|
2001-11-28 12:25:13 +03:00
|
|
|
hlen = ip->ip_hl << 2;
|
2003-06-30 11:54:28 +04:00
|
|
|
srcrt = (odst.s_addr != ip->ip_dst.s_addr);
|
2001-01-24 12:04:15 +03:00
|
|
|
}
|
1996-09-14 18:40:20 +04:00
|
|
|
#endif /* PFIL_HOOKS */
|
1996-09-06 09:07:43 +04:00
|
|
|
|
2000-12-14 20:36:44 +03:00
|
|
|
#ifdef ALTQ
|
|
|
|
/* XXX Temporary until ALTQ is changed to use a pfil hook */
|
|
|
|
if (altq_input != NULL && (*altq_input)(m, AF_INET) == 0) {
|
|
|
|
/* packet dropped by traffic conditioner */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Process options and, if not destined for us,
|
|
|
|
* ship it on. ip_dooptions returns 1 when an
|
|
|
|
* error was detected (causing an icmp message
|
|
|
|
* to be sent and the original packet to be freed).
|
|
|
|
*/
|
|
|
|
ip_nhops = 0; /* for source routed packets */
|
|
|
|
if (hlen > sizeof (struct ip) && ip_dooptions(m))
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-04-11 23:41:37 +04:00
|
|
|
/*
|
|
|
|
* Enable a consistency check between the destination address
|
|
|
|
* and the arrival interface for a unicast packet (the RFC 1122
|
|
|
|
* strong ES model) if IP forwarding is disabled and the packet
|
|
|
|
* is not locally generated.
|
|
|
|
*
|
|
|
|
* XXX - Checking also should be disabled if the destination
|
|
|
|
* address is ipnat'ed to a different interface.
|
|
|
|
*
|
|
|
|
* XXX - Checking is incompatible with IP aliases added
|
|
|
|
* to the loopback interface instead of the interface where
|
|
|
|
* the packets are received.
|
|
|
|
*
|
|
|
|
* XXX - We need to add a per ifaddr flag for this so that
|
|
|
|
* we get finer grain control.
|
|
|
|
*/
|
|
|
|
checkif = ip_checkinterface && (ipforwarding == 0) &&
|
|
|
|
(m->m_pkthdr.rcvif != NULL) &&
|
|
|
|
((m->m_pkthdr.rcvif->if_flags & IFF_LOOPBACK) == 0);
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Check our list of addresses, to see if the packet is for us.
|
2000-02-16 15:40:40 +03:00
|
|
|
*
|
|
|
|
* Traditional 4.4BSD did not consult IFF_UP at all.
|
|
|
|
* The behavior here is to treat addresses on !IFF_UP interface
|
|
|
|
* as not mine.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2000-02-16 15:40:40 +03:00
|
|
|
downmatch = 0;
|
2001-11-04 23:55:25 +03:00
|
|
|
LIST_FOREACH(ia, &IN_IFADDR_HASH(ip->ip_dst.s_addr), ia_hash) {
|
2000-02-11 08:57:58 +03:00
|
|
|
if (in_hosteq(ia->ia_addr.sin_addr, ip->ip_dst)) {
|
2003-04-11 23:41:37 +04:00
|
|
|
if (checkif && ia->ia_ifp != m->m_pkthdr.rcvif)
|
|
|
|
continue;
|
2000-02-11 08:57:58 +03:00
|
|
|
if ((ia->ia_ifp->if_flags & IFF_UP) != 0)
|
|
|
|
break;
|
2000-02-16 15:40:40 +03:00
|
|
|
else
|
|
|
|
downmatch++;
|
2000-02-11 08:57:58 +03:00
|
|
|
}
|
|
|
|
}
|
1999-05-04 02:12:44 +04:00
|
|
|
if (ia != NULL)
|
|
|
|
goto ours;
|
1998-02-13 21:21:38 +03:00
|
|
|
if (m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST) {
|
2001-11-04 23:55:25 +03:00
|
|
|
TAILQ_FOREACH(ifa, &m->m_pkthdr.rcvif->if_addrlist, ifa_list) {
|
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
1998-02-13 21:21:38 +03:00
|
|
|
ia = ifatoia(ifa);
|
1996-09-09 18:51:07 +04:00
|
|
|
if (in_hosteq(ip->ip_dst, ia->ia_broadaddr.sin_addr) ||
|
|
|
|
in_hosteq(ip->ip_dst, ia->ia_netbroadcast) ||
|
1995-06-04 09:58:20 +04:00
|
|
|
/*
|
|
|
|
* Look for all-0's host part (old broadcast addr),
|
|
|
|
* either for subnet or net.
|
|
|
|
*/
|
|
|
|
ip->ip_dst.s_addr == ia->ia_subnet ||
|
1995-06-02 01:35:34 +04:00
|
|
|
ip->ip_dst.s_addr == ia->ia_net)
|
1993-03-21 12:45:37 +03:00
|
|
|
goto ours;
|
1998-02-13 21:21:38 +03:00
|
|
|
/*
|
|
|
|
* An interface with IP address zero accepts
|
|
|
|
* all packets that arrive on that interface.
|
|
|
|
*/
|
|
|
|
if (in_nullhost(ia->ia_addr.sin_addr))
|
|
|
|
goto ours;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
1995-06-02 01:35:34 +04:00
|
|
|
if (IN_MULTICAST(ip->ip_dst.s_addr)) {
|
1993-12-06 07:50:19 +03:00
|
|
|
struct in_multi *inm;
|
|
|
|
#ifdef MROUTING
|
|
|
|
extern struct socket *ip_mrouter;
|
|
|
|
|
2002-04-19 02:33:21 +04:00
|
|
|
if (M_READONLY(m)) {
|
1994-01-29 14:57:45 +03:00
|
|
|
if ((m = m_pullup(m, hlen)) == 0) {
|
|
|
|
ipstat.ips_toosmall++;
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1994-01-29 14:57:45 +03:00
|
|
|
}
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
}
|
|
|
|
|
1993-12-06 07:50:19 +03:00
|
|
|
if (ip_mrouter) {
|
|
|
|
/*
|
|
|
|
* If we are acting as a multicast router, all
|
|
|
|
* incoming multicast packets are passed to the
|
|
|
|
* kernel-level multicast forwarding function.
|
|
|
|
* The packet is returned (relatively) intact; if
|
|
|
|
* ip_mforward() returns a non-zero value, the packet
|
|
|
|
* must be discarded, else it may be accepted below.
|
|
|
|
*
|
|
|
|
* (The IP ident field is put in the same byte order
|
|
|
|
* as expected when ip_mforward() is called from
|
|
|
|
* ip_output().)
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ip_mforward(m, m->m_pkthdr.rcvif) != 0) {
|
|
|
|
ipstat.ips_cantforward++;
|
1993-12-06 07:50:19 +03:00
|
|
|
m_freem(m);
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The process-level routing demon needs to receive
|
|
|
|
* all multicast IGMP packets, whether or not this
|
|
|
|
* host belongs to their destination groups.
|
|
|
|
*/
|
|
|
|
if (ip->ip_p == IPPROTO_IGMP)
|
|
|
|
goto ours;
|
1994-05-13 10:02:48 +04:00
|
|
|
ipstat.ips_forward++;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/*
|
|
|
|
* See if we belong to the destination multicast group on the
|
|
|
|
* arrival interface.
|
|
|
|
*/
|
|
|
|
IN_LOOKUP_MULTI(ip->ip_dst, m->m_pkthdr.rcvif, inm);
|
|
|
|
if (inm == NULL) {
|
1994-05-13 10:02:48 +04:00
|
|
|
ipstat.ips_cantforward++;
|
1993-12-06 07:50:19 +03:00
|
|
|
m_freem(m);
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
|
|
|
goto ours;
|
|
|
|
}
|
1995-06-04 09:06:49 +04:00
|
|
|
if (ip->ip_dst.s_addr == INADDR_BROADCAST ||
|
1996-09-09 18:51:07 +04:00
|
|
|
in_nullhost(ip->ip_dst))
|
1993-03-21 12:45:37 +03:00
|
|
|
goto ours;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Not for us; forward if possible and desirable.
|
|
|
|
*/
|
|
|
|
if (ipforwarding == 0) {
|
|
|
|
ipstat.ips_cantforward++;
|
|
|
|
m_freem(m);
|
2000-02-16 15:40:40 +03:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If ip_dst matched any of my address on !IFF_UP interface,
|
|
|
|
* and there's no IFF_UP interface that matches ip_dst,
|
|
|
|
* send icmp unreach. Forwarding it will result in in-kernel
|
|
|
|
* forwarding loop till TTL goes to 0.
|
|
|
|
*/
|
|
|
|
if (downmatch) {
|
|
|
|
icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, 0, 0);
|
|
|
|
ipstat.ips_cantforward++;
|
|
|
|
return;
|
|
|
|
}
|
2002-02-25 05:17:55 +03:00
|
|
|
#ifdef IPSEC
|
|
|
|
if (ipsec4_in_reject(m, NULL)) {
|
|
|
|
ipsecstat.in_polvio++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
#endif
|
2003-08-15 07:42:00 +04:00
|
|
|
#ifdef FAST_IPSEC
|
|
|
|
mtag = m_tag_find(m, PACKET_TAG_IPSEC_IN_DONE, NULL);
|
|
|
|
s = splsoftnet();
|
|
|
|
if (mtag != NULL) {
|
|
|
|
tdbi = (struct tdb_ident *)(mtag + 1);
|
|
|
|
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
|
|
|
|
} else {
|
|
|
|
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
|
|
|
|
IP_FORWARDING, &error);
|
|
|
|
}
|
|
|
|
if (sp == NULL) { /* NB: can happen if error */
|
|
|
|
splx(s);
|
|
|
|
/*XXX error stat???*/
|
|
|
|
DPRINTF(("ip_input: no SP for forwarding\n")); /*XXX*/
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check security policy against packet attributes.
|
|
|
|
*/
|
|
|
|
error = ipsec_in_reject(sp, m);
|
|
|
|
KEY_FREESP(&sp);
|
|
|
|
splx(s);
|
|
|
|
if (error) {
|
|
|
|
ipstat.ips_cantforward++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
#endif /* FAST_IPSEC */
|
2002-02-25 05:17:55 +03:00
|
|
|
|
2003-06-30 11:54:28 +04:00
|
|
|
ip_forward(m, srcrt);
|
2000-02-16 15:40:40 +03:00
|
|
|
}
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
ours:
|
|
|
|
/*
|
|
|
|
* If offset or IP_MF are set, must reassemble.
|
|
|
|
* Otherwise, nothing need be done.
|
|
|
|
* (We could look in the reassembly queue to see
|
|
|
|
* if the packet was previously fragmented,
|
|
|
|
* but it's not worth the time; just let them time out.)
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
if (ip->ip_off & ~htons(IP_DF|IP_RF)) {
|
|
|
|
if (M_READONLY(m)) {
|
|
|
|
if ((m = m_pullup(m, hlen)) == NULL) {
|
|
|
|
ipstat.ips_toosmall++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Look for queue of fragments
|
|
|
|
* of this datagram.
|
|
|
|
*/
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_LOCK();
|
2003-12-07 02:56:10 +03:00
|
|
|
hash = IPREASS_HASH(ip->ip_src.s_addr, ip->ip_id);
|
|
|
|
/* XXX LIST_FOREACH(fp, &ipq[hash], ipq_q) */
|
|
|
|
for (fp = LIST_FIRST(&ipq[hash]); fp != NULL;
|
|
|
|
fp = LIST_NEXT(fp, ipq_q)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ip->ip_id == fp->ipq_id &&
|
1996-09-09 18:51:07 +04:00
|
|
|
in_hosteq(ip->ip_src, fp->ipq_src) &&
|
|
|
|
in_hosteq(ip->ip_dst, fp->ipq_dst) &&
|
1993-03-21 12:45:37 +03:00
|
|
|
ip->ip_p == fp->ipq_p)
|
|
|
|
goto found;
|
2003-12-07 02:56:10 +03:00
|
|
|
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
fp = 0;
|
|
|
|
found:
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Adjust ip_len to not reflect header,
|
1995-11-21 04:07:34 +03:00
|
|
|
* set ipqe_mff if more fragments are expected,
|
1993-03-21 12:45:37 +03:00
|
|
|
* convert offset of this to bytes.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(ntohs(ip->ip_len) - hlen);
|
|
|
|
mff = (ip->ip_off & htons(IP_MF)) != 0;
|
1995-11-21 04:07:34 +03:00
|
|
|
if (mff) {
|
1995-05-14 12:23:00 +04:00
|
|
|
/*
|
|
|
|
* Make sure that fragments have a data length
|
|
|
|
* that's a non-zero multiple of 8 bytes.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
if (ntohs(ip->ip_len) == 0 ||
|
|
|
|
(ntohs(ip->ip_len) & 0x7) != 0) {
|
1995-05-14 12:23:00 +04:00
|
|
|
ipstat.ips_badfrags++;
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_UNLOCK();
|
1995-05-14 12:23:00 +04:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
}
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_off = htons((ntohs(ip->ip_off) & IP_OFFMASK) << 3);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If datagram marked as having more fragments
|
|
|
|
* or if this is not the first fragment,
|
|
|
|
* attempt reassembly; if it succeeds, proceed.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
if (mff || ip->ip_off != htons(0)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
ipstat.ips_fragments++;
|
1998-10-08 05:19:25 +04:00
|
|
|
ipqe = pool_get(&ipqent_pool, PR_NOWAIT);
|
1995-11-21 04:07:34 +03:00
|
|
|
if (ipqe == NULL) {
|
|
|
|
ipstat.ips_rcvmemdrop++;
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_UNLOCK();
|
1995-11-21 04:07:34 +03:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ipqe->ipqe_mff = mff;
|
1997-06-24 06:25:59 +04:00
|
|
|
ipqe->ipqe_m = m;
|
1995-11-21 04:07:34 +03:00
|
|
|
ipqe->ipqe_ip = ip;
|
2003-12-07 02:56:10 +03:00
|
|
|
m = ip_reass(ipqe, fp, &ipq[hash]);
|
1998-12-19 00:35:11 +03:00
|
|
|
if (m == 0) {
|
|
|
|
IPQ_UNLOCK();
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1998-12-19 00:35:11 +03:00
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
ipstat.ips_reassembled++;
|
1997-06-24 06:25:59 +04:00
|
|
|
ip = mtod(m, struct ip *);
|
1998-11-13 06:24:22 +03:00
|
|
|
hlen = ip->ip_hl << 2;
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(ntohs(ip->ip_len) + hlen);
|
1993-03-21 12:45:37 +03:00
|
|
|
} else
|
|
|
|
if (fp)
|
|
|
|
ip_freef(fp);
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_UNLOCK();
|
1999-01-20 02:03:20 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-08-15 07:42:00 +04:00
|
|
|
#if defined(IPSEC)
|
2001-03-01 19:31:37 +03:00
|
|
|
/*
|
|
|
|
* enforce IPsec policy checking if we are seeing last header.
|
|
|
|
* note that we do not visit this with protocols with pcb layer
|
|
|
|
* code - like udp/tcp/raw ip.
|
|
|
|
*/
|
|
|
|
if ((inetsw[ip_protox[ip->ip_p]].pr_flags & PR_LASTHDR) != 0 &&
|
|
|
|
ipsec4_in_reject(m, NULL)) {
|
|
|
|
ipsecstat.in_polvio++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
#endif
|
2003-08-15 07:42:00 +04:00
|
|
|
#if FAST_IPSEC
|
|
|
|
/*
|
|
|
|
* enforce IPsec policy checking if we are seeing last header.
|
|
|
|
* note that we do not visit this with protocols with pcb layer
|
|
|
|
* code - like udp/tcp/raw ip.
|
|
|
|
*/
|
|
|
|
if ((inetsw[ip_protox[ip->ip_p]].pr_flags & PR_LASTHDR) != 0) {
|
|
|
|
/*
|
|
|
|
* Check if the packet has already had IPsec processing
|
|
|
|
* done. If so, then just pass it along. This tag gets
|
|
|
|
* set during AH, ESP, etc. input handling, before the
|
|
|
|
* packet is returned to the ip input queue for delivery.
|
|
|
|
*/
|
|
|
|
mtag = m_tag_find(m, PACKET_TAG_IPSEC_IN_DONE, NULL);
|
|
|
|
s = splsoftnet();
|
|
|
|
if (mtag != NULL) {
|
|
|
|
tdbi = (struct tdb_ident *)(mtag + 1);
|
|
|
|
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
|
|
|
|
} else {
|
|
|
|
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
|
|
|
|
IP_FORWARDING, &error);
|
|
|
|
}
|
|
|
|
if (sp != NULL) {
|
|
|
|
/*
|
|
|
|
* Check security policy against packet attributes.
|
|
|
|
*/
|
|
|
|
error = ipsec_in_reject(sp, m);
|
|
|
|
KEY_FREESP(&sp);
|
|
|
|
} else {
|
|
|
|
/* XXX error stat??? */
|
|
|
|
error = EINVAL;
|
|
|
|
DPRINTF(("ip_input: no SP, packet discarded\n"));/*XXX*/
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
if (error)
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
#endif /* FAST_IPSEC */
|
2001-03-01 19:31:37 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Switch out to protocol's input routine.
|
|
|
|
*/
|
1999-03-27 04:24:49 +03:00
|
|
|
#if IFA_STATS
|
2000-11-24 06:43:20 +03:00
|
|
|
if (ia && ip)
|
2002-08-14 04:23:27 +04:00
|
|
|
ia->ia_ifa.ifa_data.ifad_inbytes += ntohs(ip->ip_len);
|
1999-03-27 04:24:49 +03:00
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
ipstat.ips_delivered++;
|
1999-07-01 12:12:45 +04:00
|
|
|
{
|
|
|
|
int off = hlen, nh = ip->ip_p;
|
|
|
|
|
|
|
|
(*inetsw[ip_protox[nh]].pr_input)(m, off, nh);
|
|
|
|
return;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
bad:
|
|
|
|
m_freem(m);
|
2001-06-02 20:17:09 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
badcsum:
|
|
|
|
ipstat.ips_badsum++;
|
|
|
|
m_freem(m);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Take incoming datagram fragment and try to
|
|
|
|
* reassemble it into whole datagram. If a chain for
|
|
|
|
* reassembly of this datagram already exists, then it
|
|
|
|
* is given as fp; otherwise have to make a chain.
|
|
|
|
*/
|
1997-06-24 06:25:59 +04:00
|
|
|
struct mbuf *
|
2003-12-07 02:56:10 +03:00
|
|
|
ip_reass(ipqe, fp, ipqhead)
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ipqent *ipqe;
|
|
|
|
struct ipq *fp;
|
2003-12-07 02:56:10 +03:00
|
|
|
struct ipqhead *ipqhead;
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct mbuf *m = ipqe->ipqe_m;
|
|
|
|
struct ipqent *nq, *p, *q;
|
1995-11-21 04:07:34 +03:00
|
|
|
struct ip *ip;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct mbuf *t;
|
1995-11-21 04:07:34 +03:00
|
|
|
int hlen = ipqe->ipqe_ip->ip_hl << 2;
|
1993-03-21 12:45:37 +03:00
|
|
|
int i, next;
|
|
|
|
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_LOCK_CHECK();
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Presence of header sizes in mbufs
|
|
|
|
* would confuse code below.
|
|
|
|
*/
|
|
|
|
m->m_data += hlen;
|
|
|
|
m->m_len -= hlen;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If first fragment to arrive, create a reassembly queue.
|
|
|
|
*/
|
|
|
|
if (fp == 0) {
|
2001-03-27 06:24:38 +04:00
|
|
|
/*
|
|
|
|
* Enforce upper bound on number of fragmented packets
|
|
|
|
* for which we attempt reassembly;
|
|
|
|
* If maxfrag is 0, never accept fragments.
|
|
|
|
* If maxfrag is -1, accept all fragments without limitation.
|
|
|
|
*/
|
|
|
|
if (ip_maxfragpackets < 0)
|
|
|
|
;
|
|
|
|
else if (ip_nfragpackets >= ip_maxfragpackets)
|
|
|
|
goto dropfrag;
|
|
|
|
ip_nfragpackets++;
|
1997-06-24 06:25:59 +04:00
|
|
|
MALLOC(fp, struct ipq *, sizeof (struct ipq),
|
|
|
|
M_FTABLE, M_NOWAIT);
|
|
|
|
if (fp == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
goto dropfrag;
|
2003-12-07 02:56:10 +03:00
|
|
|
LIST_INSERT_HEAD(ipqhead, fp, ipq_q);
|
1993-03-21 12:45:37 +03:00
|
|
|
fp->ipq_ttl = IPFRAGTTL;
|
1995-11-21 04:07:34 +03:00
|
|
|
fp->ipq_p = ipqe->ipqe_ip->ip_p;
|
|
|
|
fp->ipq_id = ipqe->ipqe_ip->ip_id;
|
2002-05-07 06:59:38 +04:00
|
|
|
TAILQ_INIT(&fp->ipq_fragq);
|
1995-11-21 04:07:34 +03:00
|
|
|
fp->ipq_src = ipqe->ipqe_ip->ip_src;
|
|
|
|
fp->ipq_dst = ipqe->ipqe_ip->ip_dst;
|
|
|
|
p = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto insert;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find a segment which begins after this one does.
|
|
|
|
*/
|
2002-05-07 06:59:38 +04:00
|
|
|
for (p = NULL, q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL;
|
|
|
|
p = q, q = TAILQ_NEXT(q, ipqe_q))
|
2002-08-14 04:23:27 +04:00
|
|
|
if (ntohs(q->ipqe_ip->ip_off) > ntohs(ipqe->ipqe_ip->ip_off))
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is a preceding segment, it may provide some of
|
|
|
|
* our data already. If so, drop the data from the incoming
|
|
|
|
* segment. If it provides all of our data, drop us.
|
|
|
|
*/
|
1995-11-21 04:07:34 +03:00
|
|
|
if (p != NULL) {
|
2002-08-14 04:23:27 +04:00
|
|
|
i = ntohs(p->ipqe_ip->ip_off) + ntohs(p->ipqe_ip->ip_len) -
|
|
|
|
ntohs(ipqe->ipqe_ip->ip_off);
|
1993-03-21 12:45:37 +03:00
|
|
|
if (i > 0) {
|
2002-08-14 04:23:27 +04:00
|
|
|
if (i >= ntohs(ipqe->ipqe_ip->ip_len))
|
1993-03-21 12:45:37 +03:00
|
|
|
goto dropfrag;
|
1997-06-24 06:25:59 +04:00
|
|
|
m_adj(ipqe->ipqe_m, i);
|
2002-08-14 04:23:27 +04:00
|
|
|
ipqe->ipqe_ip->ip_off =
|
|
|
|
htons(ntohs(ipqe->ipqe_ip->ip_off) + i);
|
|
|
|
ipqe->ipqe_ip->ip_len =
|
|
|
|
htons(ntohs(ipqe->ipqe_ip->ip_len) - i);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* While we overlap succeeding segments trim them or,
|
|
|
|
* if they are completely covered, dequeue them.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
for (; q != NULL &&
|
|
|
|
ntohs(ipqe->ipqe_ip->ip_off) + ntohs(ipqe->ipqe_ip->ip_len) >
|
|
|
|
ntohs(q->ipqe_ip->ip_off); q = nq) {
|
|
|
|
i = (ntohs(ipqe->ipqe_ip->ip_off) +
|
|
|
|
ntohs(ipqe->ipqe_ip->ip_len)) - ntohs(q->ipqe_ip->ip_off);
|
|
|
|
if (i < ntohs(q->ipqe_ip->ip_len)) {
|
|
|
|
q->ipqe_ip->ip_len =
|
|
|
|
htons(ntohs(q->ipqe_ip->ip_len) - i);
|
|
|
|
q->ipqe_ip->ip_off =
|
|
|
|
htons(ntohs(q->ipqe_ip->ip_off) + i);
|
1997-06-24 06:25:59 +04:00
|
|
|
m_adj(q->ipqe_m, i);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
}
|
2002-05-07 06:59:38 +04:00
|
|
|
nq = TAILQ_NEXT(q, ipqe_q);
|
1997-06-24 06:25:59 +04:00
|
|
|
m_freem(q->ipqe_m);
|
2002-05-07 06:59:38 +04:00
|
|
|
TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_put(&ipqent_pool, q);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
insert:
|
|
|
|
/*
|
|
|
|
* Stick new segment in its place;
|
|
|
|
* check for complete reassembly.
|
|
|
|
*/
|
1995-11-21 04:07:34 +03:00
|
|
|
if (p == NULL) {
|
2002-05-07 06:59:38 +04:00
|
|
|
TAILQ_INSERT_HEAD(&fp->ipq_fragq, ipqe, ipqe_q);
|
1995-11-21 04:07:34 +03:00
|
|
|
} else {
|
2002-05-07 06:59:38 +04:00
|
|
|
TAILQ_INSERT_AFTER(&fp->ipq_fragq, p, ipqe, ipqe_q);
|
1995-11-21 04:07:34 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
next = 0;
|
2002-05-07 06:59:38 +04:00
|
|
|
for (p = NULL, q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL;
|
|
|
|
p = q, q = TAILQ_NEXT(q, ipqe_q)) {
|
2002-08-14 04:23:27 +04:00
|
|
|
if (ntohs(q->ipqe_ip->ip_off) != next)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
2002-08-14 04:23:27 +04:00
|
|
|
next += ntohs(q->ipqe_ip->ip_len);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1995-11-21 04:07:34 +03:00
|
|
|
if (p->ipqe_mff)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
|
|
|
|
/*
|
1996-10-25 10:30:32 +04:00
|
|
|
* Reassembly is complete. Check for a bogus message size and
|
|
|
|
* concatenate fragments.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2002-05-07 06:59:38 +04:00
|
|
|
q = TAILQ_FIRST(&fp->ipq_fragq);
|
1995-11-21 04:07:34 +03:00
|
|
|
ip = q->ipqe_ip;
|
1996-10-25 10:30:32 +04:00
|
|
|
if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) {
|
|
|
|
ipstat.ips_toolong++;
|
|
|
|
ip_freef(fp);
|
|
|
|
return (0);
|
|
|
|
}
|
1997-06-24 06:25:59 +04:00
|
|
|
m = q->ipqe_m;
|
1993-03-21 12:45:37 +03:00
|
|
|
t = m->m_next;
|
|
|
|
m->m_next = 0;
|
|
|
|
m_cat(m, t);
|
2002-05-07 06:59:38 +04:00
|
|
|
nq = TAILQ_NEXT(q, ipqe_q);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_put(&ipqent_pool, q);
|
1995-11-21 04:07:34 +03:00
|
|
|
for (q = nq; q != NULL; q = nq) {
|
1997-06-24 06:25:59 +04:00
|
|
|
t = q->ipqe_m;
|
2002-05-07 06:59:38 +04:00
|
|
|
nq = TAILQ_NEXT(q, ipqe_q);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_put(&ipqent_pool, q);
|
1993-03-21 12:45:37 +03:00
|
|
|
m_cat(m, t);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create header for new ip packet by
|
|
|
|
* modifying header of first packet;
|
|
|
|
* dequeue and discard fragment reassembly header.
|
|
|
|
* Make header visible.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(next);
|
1995-11-21 04:07:34 +03:00
|
|
|
ip->ip_src = fp->ipq_src;
|
|
|
|
ip->ip_dst = fp->ipq_dst;
|
|
|
|
LIST_REMOVE(fp, ipq_q);
|
1997-06-24 06:25:59 +04:00
|
|
|
FREE(fp, M_FTABLE);
|
2001-03-27 06:24:38 +04:00
|
|
|
ip_nfragpackets--;
|
1993-03-21 12:45:37 +03:00
|
|
|
m->m_len += (ip->ip_hl << 2);
|
|
|
|
m->m_data -= (ip->ip_hl << 2);
|
|
|
|
/* some debugging cruft by sklower, below, will go away soon */
|
|
|
|
if (m->m_flags & M_PKTHDR) { /* XXX this should be done elsewhere */
|
2000-03-30 16:51:13 +04:00
|
|
|
int plen = 0;
|
1997-06-24 06:25:59 +04:00
|
|
|
for (t = m; t; t = t->m_next)
|
|
|
|
plen += t->m_len;
|
|
|
|
m->m_pkthdr.len = plen;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1997-06-24 06:25:59 +04:00
|
|
|
return (m);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
dropfrag:
|
|
|
|
ipstat.ips_fragdropped++;
|
|
|
|
m_freem(m);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_put(&ipqent_pool, ipqe);
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free a fragment reassembly header and all
|
|
|
|
* associated datagrams.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_freef(fp)
|
|
|
|
struct ipq *fp;
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ipqent *q, *p;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_LOCK_CHECK();
|
|
|
|
|
2002-05-07 06:59:38 +04:00
|
|
|
for (q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL; q = p) {
|
|
|
|
p = TAILQ_NEXT(q, ipqe_q);
|
1997-06-24 06:25:59 +04:00
|
|
|
m_freem(q->ipqe_m);
|
2002-05-07 06:59:38 +04:00
|
|
|
TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q);
|
1998-10-08 05:19:25 +04:00
|
|
|
pool_put(&ipqent_pool, q);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1995-11-21 04:07:34 +03:00
|
|
|
LIST_REMOVE(fp, ipq_q);
|
1997-06-24 06:25:59 +04:00
|
|
|
FREE(fp, M_FTABLE);
|
2001-03-27 06:24:38 +04:00
|
|
|
ip_nfragpackets--;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* IP timer processing;
|
|
|
|
* if a timer expires on a reassembly
|
|
|
|
* queue, discard it.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_slowtimo()
|
|
|
|
{
|
2003-12-07 02:56:10 +03:00
|
|
|
static unsigned dropscanidx = 0;
|
|
|
|
unsigned i;
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ipq *fp, *nfp;
|
1995-08-13 03:59:09 +04:00
|
|
|
int s = splsoftnet();
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_LOCK();
|
2003-12-07 02:56:10 +03:00
|
|
|
for (i = 0; i < IPREASS_NHASH; i++) {
|
|
|
|
for (fp = LIST_FIRST(&ipq[i]); fp != NULL; fp = nfp) {
|
|
|
|
nfp = LIST_NEXT(fp, ipq_q);
|
|
|
|
if (--fp->ipq_ttl == 0) {
|
|
|
|
ipstat.ips_fragtimeout++;
|
|
|
|
ip_freef(fp);
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
2001-03-27 06:24:38 +04:00
|
|
|
/*
|
|
|
|
* If we are over the maximum number of fragments
|
|
|
|
* (due to the limit being lowered), drain off
|
2003-12-07 02:56:10 +03:00
|
|
|
* enough to get down to the new limit. Start draining
|
|
|
|
* from the reassembly hashqueue most recently drained.
|
2001-03-27 06:24:38 +04:00
|
|
|
*/
|
|
|
|
if (ip_maxfragpackets < 0)
|
|
|
|
;
|
|
|
|
else {
|
2003-12-07 02:56:10 +03:00
|
|
|
int wrapped = 0;
|
|
|
|
|
|
|
|
i = dropscanidx;
|
|
|
|
while (ip_nfragpackets > ip_maxfragpackets && wrapped == 0) {
|
|
|
|
while (LIST_FIRST(&ipq[i]) != NULL)
|
|
|
|
ip_freef(LIST_FIRST(&ipq[i]));
|
|
|
|
if (++i >= IPREASS_NHASH) {
|
|
|
|
i = 0;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Dont scan forever even if fragment counters are
|
|
|
|
* wrong: stop after scanning entire reassembly queue.
|
|
|
|
*/
|
|
|
|
if (i == dropscanidx)
|
|
|
|
wrapped = 1;
|
|
|
|
}
|
|
|
|
dropscanidx = i;
|
2001-03-27 06:24:38 +04:00
|
|
|
}
|
1998-12-19 00:35:11 +03:00
|
|
|
IPQ_UNLOCK();
|
1998-04-30 01:37:52 +04:00
|
|
|
#ifdef GATEWAY
|
|
|
|
ipflow_slowtimo();
|
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Drain off all datagram fragments.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_drain()
|
|
|
|
{
|
2003-12-07 02:56:10 +03:00
|
|
|
int i;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1998-12-19 00:35:11 +03:00
|
|
|
/*
|
|
|
|
* We may be called from a device's interrupt context. If
|
|
|
|
* the ipq is already busy, just bail out now.
|
|
|
|
*/
|
|
|
|
if (ipq_lock_try() == 0)
|
|
|
|
return;
|
|
|
|
|
2003-12-07 02:56:10 +03:00
|
|
|
for (i = 0; i < IPREASS_NHASH; i++) {
|
|
|
|
struct ipqhead *ipqh = &ipq[i];
|
|
|
|
struct ipq *fp, *nfp;
|
|
|
|
for (fp = LIST_FIRST(ipqh); fp != NULL; fp = nfp) {
|
|
|
|
nfp = LIST_NEXT(fp, ipq_q);
|
|
|
|
ip_freef(fp);
|
|
|
|
ipstat.ips_fragdropped++;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1998-12-19 00:35:11 +03:00
|
|
|
|
|
|
|
IPQ_UNLOCK();
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do option processing on a datagram,
|
|
|
|
* possibly discarding it if bad options are encountered,
|
|
|
|
* or forwarding it if source-routed.
|
|
|
|
* Returns 1 if packet has been forwarded/freed,
|
|
|
|
* 0 if the packet should be processed further.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
int
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_dooptions(m)
|
|
|
|
struct mbuf *m;
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
|
|
|
u_char *cp, *cp0;
|
|
|
|
struct ip_timestamp *ipt;
|
|
|
|
struct in_ifaddr *ia;
|
1993-03-21 12:45:37 +03:00
|
|
|
int opt, optlen, cnt, off, code, type = ICMP_PARAMPROB, forward = 0;
|
2000-03-02 09:07:36 +03:00
|
|
|
struct in_addr dst;
|
1993-03-21 12:45:37 +03:00
|
|
|
n_time ntime;
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
dst = ip->ip_dst;
|
1993-03-21 12:45:37 +03:00
|
|
|
cp = (u_char *)(ip + 1);
|
|
|
|
cnt = (ip->ip_hl << 2) - sizeof (struct ip);
|
|
|
|
for (; cnt > 0; cnt -= optlen, cp += optlen) {
|
|
|
|
opt = cp[IPOPT_OPTVAL];
|
|
|
|
if (opt == IPOPT_EOL)
|
|
|
|
break;
|
|
|
|
if (opt == IPOPT_NOP)
|
|
|
|
optlen = 1;
|
|
|
|
else {
|
2000-05-10 05:19:44 +04:00
|
|
|
if (cnt < IPOPT_OLEN + sizeof(*cp)) {
|
|
|
|
code = &cp[IPOPT_OLEN] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
optlen = cp[IPOPT_OLEN];
|
2000-05-10 07:31:30 +04:00
|
|
|
if (optlen < IPOPT_OLEN + sizeof(*cp) || optlen > cnt) {
|
1993-03-21 12:45:37 +03:00
|
|
|
code = &cp[IPOPT_OLEN] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
switch (opt) {
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Source routing with record.
|
|
|
|
* Find interface with current destination address.
|
|
|
|
* If none on this machine then drop if strictly routed,
|
|
|
|
* or do nothing if loosely routed.
|
|
|
|
* Record interface address and bring up next address
|
|
|
|
* component. If strictly routed make sure next
|
|
|
|
* address is on directly accessible net.
|
|
|
|
*/
|
|
|
|
case IPOPT_LSRR:
|
|
|
|
case IPOPT_SSRR:
|
1997-02-25 11:35:41 +03:00
|
|
|
if (ip_allowsrcrt == 0) {
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_NET_PROHIB;
|
|
|
|
goto bad;
|
|
|
|
}
|
2000-05-10 07:31:30 +04:00
|
|
|
if (optlen < IPOPT_OFFSET + sizeof(*cp)) {
|
|
|
|
code = &cp[IPOPT_OLEN] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) {
|
|
|
|
code = &cp[IPOPT_OFFSET] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ipaddr.sin_addr = ip->ip_dst;
|
1995-06-04 09:06:49 +04:00
|
|
|
ia = ifatoia(ifa_ifwithaddr(sintosa(&ipaddr)));
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ia == 0) {
|
|
|
|
if (opt == IPOPT_SSRR) {
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_SRCFAIL;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Loose routing, and not at next destination
|
|
|
|
* yet; nothing to do except forward.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
off--; /* 0 origin */
|
2000-05-06 20:35:14 +04:00
|
|
|
if ((off + sizeof(struct in_addr)) > optlen) {
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* End of source route. Should be for us.
|
|
|
|
*/
|
|
|
|
save_rte(cp, ip->ip_src);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* locate outgoing interface
|
|
|
|
*/
|
|
|
|
bcopy((caddr_t)(cp + off), (caddr_t)&ipaddr.sin_addr,
|
|
|
|
sizeof(ipaddr.sin_addr));
|
2000-02-01 03:07:09 +03:00
|
|
|
if (opt == IPOPT_SSRR)
|
|
|
|
ia = ifatoia(ifa_ifwithaddr(sintosa(&ipaddr)));
|
|
|
|
else
|
1993-03-21 12:45:37 +03:00
|
|
|
ia = ip_rtaddr(ipaddr.sin_addr);
|
|
|
|
if (ia == 0) {
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_SRCFAIL;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ip->ip_dst = ipaddr.sin_addr;
|
1995-06-04 09:58:20 +04:00
|
|
|
bcopy((caddr_t)&ia->ia_addr.sin_addr,
|
1993-03-21 12:45:37 +03:00
|
|
|
(caddr_t)(cp + off), sizeof(struct in_addr));
|
|
|
|
cp[IPOPT_OFFSET] += sizeof(struct in_addr);
|
1994-05-13 10:02:48 +04:00
|
|
|
/*
|
|
|
|
* Let ip_intr's mcast routing check handle mcast pkts
|
|
|
|
*/
|
1995-06-02 01:35:34 +04:00
|
|
|
forward = !IN_MULTICAST(ip->ip_dst.s_addr);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IPOPT_RR:
|
2000-05-10 07:31:30 +04:00
|
|
|
if (optlen < IPOPT_OFFSET + sizeof(*cp)) {
|
|
|
|
code = &cp[IPOPT_OLEN] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) {
|
|
|
|
code = &cp[IPOPT_OFFSET] - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If no space remains, ignore.
|
|
|
|
*/
|
|
|
|
off--; /* 0 origin */
|
2000-05-06 20:35:14 +04:00
|
|
|
if ((off + sizeof(struct in_addr)) > optlen)
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
bcopy((caddr_t)(&ip->ip_dst), (caddr_t)&ipaddr.sin_addr,
|
|
|
|
sizeof(ipaddr.sin_addr));
|
|
|
|
/*
|
|
|
|
* locate outgoing interface; if we're the destination,
|
|
|
|
* use the incoming interface (should be same).
|
|
|
|
*/
|
2000-02-01 03:07:09 +03:00
|
|
|
if ((ia = ifatoia(ifa_ifwithaddr(sintosa(&ipaddr))))
|
|
|
|
== NULL &&
|
|
|
|
(ia = ip_rtaddr(ipaddr.sin_addr)) == NULL) {
|
1993-03-21 12:45:37 +03:00
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_HOST;
|
|
|
|
goto bad;
|
|
|
|
}
|
1995-06-04 09:58:20 +04:00
|
|
|
bcopy((caddr_t)&ia->ia_addr.sin_addr,
|
1993-03-21 12:45:37 +03:00
|
|
|
(caddr_t)(cp + off), sizeof(struct in_addr));
|
|
|
|
cp[IPOPT_OFFSET] += sizeof(struct in_addr);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPOPT_TS:
|
|
|
|
code = cp - (u_char *)ip;
|
|
|
|
ipt = (struct ip_timestamp *)cp;
|
2000-05-10 07:31:30 +04:00
|
|
|
if (ipt->ipt_len < 4 || ipt->ipt_len > 40) {
|
|
|
|
code = (u_char *)&ipt->ipt_len - (u_char *)ip;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
2000-05-10 07:31:30 +04:00
|
|
|
}
|
|
|
|
if (ipt->ipt_ptr < 5) {
|
|
|
|
code = (u_char *)&ipt->ipt_ptr - (u_char *)ip;
|
|
|
|
goto bad;
|
|
|
|
}
|
1995-04-13 10:25:36 +04:00
|
|
|
if (ipt->ipt_ptr > ipt->ipt_len - sizeof (int32_t)) {
|
2000-05-10 07:31:30 +04:00
|
|
|
if (++ipt->ipt_oflw == 0) {
|
|
|
|
code = (u_char *)&ipt->ipt_ptr -
|
|
|
|
(u_char *)ip;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
2000-05-10 07:31:30 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
}
|
2000-03-02 09:07:36 +03:00
|
|
|
cp0 = (cp + ipt->ipt_ptr - 1);
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (ipt->ipt_flg) {
|
|
|
|
|
|
|
|
case IPOPT_TS_TSONLY:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPOPT_TS_TSANDADDR:
|
1998-05-25 00:14:53 +04:00
|
|
|
if (ipt->ipt_ptr - 1 + sizeof(n_time) +
|
2000-05-10 07:31:30 +04:00
|
|
|
sizeof(struct in_addr) > ipt->ipt_len) {
|
|
|
|
code = (u_char *)&ipt->ipt_ptr -
|
|
|
|
(u_char *)ip;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
2000-05-10 07:31:30 +04:00
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
ipaddr.sin_addr = dst;
|
2000-02-01 03:07:09 +03:00
|
|
|
ia = ifatoia(ifaof_ifpforaddr(sintosa(&ipaddr),
|
|
|
|
m->m_pkthdr.rcvif));
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ia == 0)
|
|
|
|
continue;
|
2000-03-02 09:07:36 +03:00
|
|
|
bcopy(&ia->ia_addr.sin_addr,
|
|
|
|
cp0, sizeof(struct in_addr));
|
1993-03-21 12:45:37 +03:00
|
|
|
ipt->ipt_ptr += sizeof(struct in_addr);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPOPT_TS_PRESPEC:
|
1998-05-25 00:14:53 +04:00
|
|
|
if (ipt->ipt_ptr - 1 + sizeof(n_time) +
|
2000-05-10 07:31:30 +04:00
|
|
|
sizeof(struct in_addr) > ipt->ipt_len) {
|
|
|
|
code = (u_char *)&ipt->ipt_ptr -
|
|
|
|
(u_char *)ip;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
2000-05-10 07:31:30 +04:00
|
|
|
}
|
2000-03-02 09:07:36 +03:00
|
|
|
bcopy(cp0, &ipaddr.sin_addr,
|
1993-03-21 12:45:37 +03:00
|
|
|
sizeof(struct in_addr));
|
2000-02-01 03:07:09 +03:00
|
|
|
if (ifatoia(ifa_ifwithaddr(sintosa(&ipaddr)))
|
|
|
|
== NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
continue;
|
|
|
|
ipt->ipt_ptr += sizeof(struct in_addr);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2000-05-10 07:31:30 +04:00
|
|
|
/* XXX can't take &ipt->ipt_flg */
|
|
|
|
code = (u_char *)&ipt->ipt_ptr -
|
|
|
|
(u_char *)ip + 1;
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ntime = iptime();
|
2000-03-11 01:39:03 +03:00
|
|
|
cp0 = (u_char *) &ntime; /* XXX grumble, GCC... */
|
|
|
|
bcopy(cp0, (caddr_t)cp + ipt->ipt_ptr - 1,
|
1993-03-21 12:45:37 +03:00
|
|
|
sizeof(n_time));
|
|
|
|
ipt->ipt_ptr += sizeof(n_time);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (forward) {
|
1996-01-16 00:11:46 +03:00
|
|
|
if (ip_forwsrcrt == 0) {
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_SRCFAIL;
|
|
|
|
goto bad;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_forward(m, 1);
|
|
|
|
return (1);
|
1994-05-13 10:02:48 +04:00
|
|
|
}
|
|
|
|
return (0);
|
1993-03-21 12:45:37 +03:00
|
|
|
bad:
|
1994-05-13 10:02:48 +04:00
|
|
|
icmp_error(m, type, code, 0, 0);
|
|
|
|
ipstat.ips_badoptions++;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Given address of next destination (final or next hop),
|
|
|
|
* return internet address info of interface to be used to get there.
|
|
|
|
*/
|
|
|
|
struct in_ifaddr *
|
|
|
|
ip_rtaddr(dst)
|
|
|
|
struct in_addr dst;
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct sockaddr_in *sin;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1995-06-04 09:06:49 +04:00
|
|
|
sin = satosin(&ipforward_rt.ro_dst);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1996-09-09 18:51:07 +04:00
|
|
|
if (ipforward_rt.ro_rt == 0 || !in_hosteq(dst, sin->sin_addr)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ipforward_rt.ro_rt) {
|
|
|
|
RTFREE(ipforward_rt.ro_rt);
|
|
|
|
ipforward_rt.ro_rt = 0;
|
|
|
|
}
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_len = sizeof(*sin);
|
|
|
|
sin->sin_addr = dst;
|
|
|
|
|
|
|
|
rtalloc(&ipforward_rt);
|
|
|
|
}
|
|
|
|
if (ipforward_rt.ro_rt == 0)
|
|
|
|
return ((struct in_ifaddr *)0);
|
1995-06-04 09:06:49 +04:00
|
|
|
return (ifatoia(ipforward_rt.ro_rt->rt_ifa));
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Save incoming source route for use in replies,
|
|
|
|
* to be picked up later by ip_srcroute if the receiver is interested.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
save_rte(option, dst)
|
|
|
|
u_char *option;
|
|
|
|
struct in_addr dst;
|
|
|
|
{
|
|
|
|
unsigned olen;
|
|
|
|
|
|
|
|
olen = option[IPOPT_OLEN];
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("save_rte: olen %d\n", olen);
|
1999-07-01 12:12:45 +04:00
|
|
|
#endif /* 0 */
|
1993-03-21 12:45:37 +03:00
|
|
|
if (olen > sizeof(ip_srcrt) - (1 + sizeof(dst)))
|
|
|
|
return;
|
|
|
|
bcopy((caddr_t)option, (caddr_t)ip_srcrt.srcopt, olen);
|
|
|
|
ip_nhops = (olen - IPOPT_OFFSET - 1) / sizeof(struct in_addr);
|
|
|
|
ip_srcrt.dst = dst;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Retrieve incoming source route for use in replies,
|
|
|
|
* in the same form used by setsockopt.
|
|
|
|
* The first hop is placed before the options, will be removed later.
|
|
|
|
*/
|
|
|
|
struct mbuf *
|
|
|
|
ip_srcroute()
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct in_addr *p, *q;
|
|
|
|
struct mbuf *m;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
if (ip_nhops == 0)
|
|
|
|
return ((struct mbuf *)0);
|
|
|
|
m = m_get(M_DONTWAIT, MT_SOOPTS);
|
|
|
|
if (m == 0)
|
|
|
|
return ((struct mbuf *)0);
|
|
|
|
|
2003-02-26 09:31:08 +03:00
|
|
|
MCLAIM(m, &inetdomain.dom_mowner);
|
1994-05-13 10:02:48 +04:00
|
|
|
#define OPTSIZ (sizeof(ip_srcrt.nop) + sizeof(ip_srcrt.srcopt))
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/* length is (nhops+1)*sizeof(addr) + sizeof(nop + srcrt header) */
|
|
|
|
m->m_len = ip_nhops * sizeof(struct in_addr) + sizeof(struct in_addr) +
|
|
|
|
OPTSIZ;
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("ip_srcroute: nhops %d mlen %d", ip_nhops, m->m_len);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* First save first hop for return route
|
|
|
|
*/
|
|
|
|
p = &ip_srcrt.route[ip_nhops - 1];
|
|
|
|
*(mtod(m, struct in_addr *)) = *p--;
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf(" hops %x", ntohl(mtod(m, struct in_addr *)->s_addr));
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy option fields and padding (nop) to mbuf.
|
|
|
|
*/
|
|
|
|
ip_srcrt.nop = IPOPT_NOP;
|
|
|
|
ip_srcrt.srcopt[IPOPT_OFFSET] = IPOPT_MINOFF;
|
|
|
|
bcopy((caddr_t)&ip_srcrt.nop,
|
|
|
|
mtod(m, caddr_t) + sizeof(struct in_addr), OPTSIZ);
|
|
|
|
q = (struct in_addr *)(mtod(m, caddr_t) +
|
|
|
|
sizeof(struct in_addr) + OPTSIZ);
|
|
|
|
#undef OPTSIZ
|
|
|
|
/*
|
|
|
|
* Record return path as an IP source route,
|
|
|
|
* reversing the path (pointers are now aligned).
|
|
|
|
*/
|
|
|
|
while (p >= ip_srcrt.route) {
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf(" %x", ntohl(q->s_addr));
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
*q++ = *p--;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Last hop goes to final destination.
|
|
|
|
*/
|
|
|
|
*q = ip_srcrt.dst;
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf(" %x\n", ntohl(q->s_addr));
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
return (m);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Strip out IP options, at higher
|
|
|
|
* level protocol in the kernel.
|
|
|
|
* Second argument is buffer to which options
|
|
|
|
* will be moved, and return value is their length.
|
|
|
|
* XXX should be deleted; last arg currently ignored.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_stripoptions(m, mopt)
|
2000-03-30 16:51:13 +04:00
|
|
|
struct mbuf *m;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct mbuf *mopt;
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
int i;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
2000-03-30 16:51:13 +04:00
|
|
|
caddr_t opts;
|
1993-03-21 12:45:37 +03:00
|
|
|
int olen;
|
|
|
|
|
1999-01-20 02:03:20 +03:00
|
|
|
olen = (ip->ip_hl << 2) - sizeof (struct ip);
|
1993-03-21 12:45:37 +03:00
|
|
|
opts = (caddr_t)(ip + 1);
|
|
|
|
i = m->m_len - (sizeof (struct ip) + olen);
|
|
|
|
bcopy(opts + olen, opts, (unsigned)i);
|
|
|
|
m->m_len -= olen;
|
|
|
|
if (m->m_flags & M_PKTHDR)
|
|
|
|
m->m_pkthdr.len -= olen;
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(ntohs(ip->ip_len) - olen);
|
1999-01-20 02:03:20 +03:00
|
|
|
ip->ip_hl = sizeof (struct ip) >> 2;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
2001-11-04 16:42:27 +03:00
|
|
|
const int inetctlerrmap[PRC_NCMDS] = {
|
1993-03-21 12:45:37 +03:00
|
|
|
0, 0, 0, 0,
|
|
|
|
0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH,
|
|
|
|
EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED,
|
|
|
|
EMSGSIZE, EHOSTUNREACH, 0, 0,
|
|
|
|
0, 0, 0, 0,
|
|
|
|
ENOPROTOOPT
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Forward a packet. If some error occurs return the sender
|
|
|
|
* an icmp packet. Note we can't always generate a meaningful
|
|
|
|
* icmp message because icmp doesn't have a large enough repertoire
|
|
|
|
* of codes and types.
|
|
|
|
*
|
|
|
|
* If not forwarding, just drop the packet. This could be confusing
|
|
|
|
* if ipforwarding was zero but some routing protocol was advancing
|
|
|
|
* us as a gateway to somewhere. However, we must let the routing
|
|
|
|
* protocol deal with that.
|
|
|
|
*
|
|
|
|
* The srcrt parameter indicates whether the packet is being forwarded
|
|
|
|
* via a source route.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
void
|
1993-03-21 12:45:37 +03:00
|
|
|
ip_forward(m, srcrt)
|
|
|
|
struct mbuf *m;
|
|
|
|
int srcrt;
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
struct rtentry *rt;
|
1996-02-14 02:40:59 +03:00
|
|
|
int error, type = 0, code = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct mbuf *mcopy;
|
1994-05-13 10:02:48 +04:00
|
|
|
n_long dest;
|
|
|
|
struct ifnet *destifp;
|
2003-08-15 07:42:00 +04:00
|
|
|
#if defined(IPSEC) || defined(FAST_IPSEC)
|
1999-07-01 12:12:45 +04:00
|
|
|
struct ifnet dummyifp;
|
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2003-02-26 09:31:08 +03:00
|
|
|
/*
|
|
|
|
* We are now in the output path.
|
|
|
|
*/
|
|
|
|
MCLAIM(m, &ip_tx_mowner);
|
|
|
|
|
2001-06-02 20:17:09 +04:00
|
|
|
/*
|
|
|
|
* Clear any in-bound checksum flags for this packet.
|
|
|
|
*/
|
|
|
|
m->m_pkthdr.csum_flags = 0;
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
dest = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (ipprintfs)
|
1998-09-09 08:57:18 +04:00
|
|
|
printf("forward: src %2.2x dst %2.2x ttl %x\n",
|
|
|
|
ntohl(ip->ip_src.s_addr),
|
|
|
|
ntohl(ip->ip_dst.s_addr), ip->ip_ttl);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
1999-10-17 20:00:00 +04:00
|
|
|
if (m->m_flags & (M_BCAST|M_MCAST) || in_canforward(ip->ip_dst) == 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
ipstat.ips_cantforward++;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (ip->ip_ttl <= IPTTLDEC) {
|
1994-05-13 10:02:48 +04:00
|
|
|
icmp_error(m, ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS, dest, 0);
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
ip->ip_ttl -= IPTTLDEC;
|
|
|
|
|
1995-06-04 09:06:49 +04:00
|
|
|
sin = satosin(&ipforward_rt.ro_dst);
|
1993-03-21 12:45:37 +03:00
|
|
|
if ((rt = ipforward_rt.ro_rt) == 0 ||
|
1996-09-09 18:51:07 +04:00
|
|
|
!in_hosteq(ip->ip_dst, sin->sin_addr)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ipforward_rt.ro_rt) {
|
|
|
|
RTFREE(ipforward_rt.ro_rt);
|
|
|
|
ipforward_rt.ro_rt = 0;
|
|
|
|
}
|
|
|
|
sin->sin_family = AF_INET;
|
1996-09-09 18:51:07 +04:00
|
|
|
sin->sin_len = sizeof(struct sockaddr_in);
|
1993-03-21 12:45:37 +03:00
|
|
|
sin->sin_addr = ip->ip_dst;
|
|
|
|
|
|
|
|
rtalloc(&ipforward_rt);
|
|
|
|
if (ipforward_rt.ro_rt == 0) {
|
1994-05-13 10:02:48 +04:00
|
|
|
icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_HOST, dest, 0);
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
rt = ipforward_rt.ro_rt;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1996-09-08 19:49:43 +04:00
|
|
|
* Save at most 68 bytes of the packet in case
|
1993-03-21 12:45:37 +03:00
|
|
|
* we need to generate an ICMP message to the src.
|
2000-10-13 05:50:04 +04:00
|
|
|
* Pullup to avoid sharing mbuf cluster between m and mcopy.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
mcopy = m_copym(m, 0, imin(ntohs(ip->ip_len), 68), M_DONTWAIT);
|
2000-10-13 05:50:04 +04:00
|
|
|
if (mcopy)
|
|
|
|
mcopy = m_pullup(mcopy, ip->ip_hl << 2);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If forwarding packet using same interface that it came in on,
|
|
|
|
* perhaps should send a redirect to sender to shortcut a hop.
|
|
|
|
* Only send redirect if source is sending directly to us,
|
|
|
|
* and if packet was not source routed (or has any options).
|
|
|
|
* Also, don't send redirect if forwarding using a default route
|
|
|
|
* or a route modified by a redirect.
|
|
|
|
*/
|
|
|
|
if (rt->rt_ifp == m->m_pkthdr.rcvif &&
|
|
|
|
(rt->rt_flags & (RTF_DYNAMIC|RTF_MODIFIED)) == 0 &&
|
1996-09-09 18:51:07 +04:00
|
|
|
!in_nullhost(satosin(rt_key(rt))->sin_addr) &&
|
1993-03-21 12:45:37 +03:00
|
|
|
ipsendredirects && !srcrt) {
|
1995-06-04 09:06:49 +04:00
|
|
|
if (rt->rt_ifa &&
|
|
|
|
(ip->ip_src.s_addr & ifatoia(rt->rt_ifa)->ia_subnetmask) ==
|
|
|
|
ifatoia(rt->rt_ifa)->ia_subnet) {
|
1999-01-12 01:35:06 +03:00
|
|
|
if (rt->rt_flags & RTF_GATEWAY)
|
|
|
|
dest = satosin(rt->rt_gateway)->sin_addr.s_addr;
|
|
|
|
else
|
|
|
|
dest = ip->ip_dst.s_addr;
|
|
|
|
/*
|
|
|
|
* Router requirements says to only send host
|
|
|
|
* redirects.
|
|
|
|
*/
|
|
|
|
type = ICMP_REDIRECT;
|
|
|
|
code = ICMP_REDIRECT_HOST;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef DIAGNOSTIC
|
1999-01-12 01:35:06 +03:00
|
|
|
if (ipprintfs)
|
|
|
|
printf("redirect (%d) to %x\n", code,
|
|
|
|
(u_int32_t)dest);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1996-01-16 07:17:30 +03:00
|
|
|
error = ip_output(m, (struct mbuf *)0, &ipforward_rt,
|
2003-08-15 07:42:00 +04:00
|
|
|
(IP_FORWARDING | (ip_directedbcast ? IP_ALLOWBROADCAST : 0)),
|
2003-08-23 01:53:01 +04:00
|
|
|
(struct ip_moptions *)NULL, (struct socket *)NULL);
|
2003-08-15 07:42:00 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
if (error)
|
|
|
|
ipstat.ips_cantforward++;
|
|
|
|
else {
|
|
|
|
ipstat.ips_forward++;
|
|
|
|
if (type)
|
|
|
|
ipstat.ips_redirectsent++;
|
|
|
|
else {
|
1998-04-30 01:37:52 +04:00
|
|
|
if (mcopy) {
|
|
|
|
#ifdef GATEWAY
|
1998-05-01 07:23:24 +04:00
|
|
|
if (mcopy->m_flags & M_CANFASTFWD)
|
|
|
|
ipflow_create(&ipforward_rt, mcopy);
|
1998-04-30 01:37:52 +04:00
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
m_freem(mcopy);
|
1998-04-30 01:37:52 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (mcopy == NULL)
|
|
|
|
return;
|
1994-05-13 10:02:48 +04:00
|
|
|
destifp = NULL;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (error) {
|
|
|
|
|
|
|
|
case 0: /* forwarded, but need redirect */
|
|
|
|
/* type, code set above */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ENETUNREACH: /* shouldn't happen, checked above */
|
|
|
|
case EHOSTUNREACH:
|
|
|
|
case ENETDOWN:
|
|
|
|
case EHOSTDOWN:
|
|
|
|
default:
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_HOST;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case EMSGSIZE:
|
|
|
|
type = ICMP_UNREACH;
|
|
|
|
code = ICMP_UNREACH_NEEDFRAG;
|
2003-08-15 07:42:00 +04:00
|
|
|
#if !defined(IPSEC) && !defined(FAST_IPSEC)
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ipforward_rt.ro_rt)
|
|
|
|
destifp = ipforward_rt.ro_rt->rt_ifp;
|
1999-07-01 12:12:45 +04:00
|
|
|
#else
|
|
|
|
/*
|
|
|
|
* If the packet is routed over IPsec tunnel, tell the
|
|
|
|
* originator the tunnel MTU.
|
|
|
|
* tunnel MTU = if MTU - sizeof(IP) - ESP/AH hdrsiz
|
|
|
|
* XXX quickhack!!!
|
|
|
|
*/
|
|
|
|
if (ipforward_rt.ro_rt) {
|
|
|
|
struct secpolicy *sp;
|
|
|
|
int ipsecerror;
|
2000-01-31 17:18:52 +03:00
|
|
|
size_t ipsechdr;
|
1999-07-01 12:12:45 +04:00
|
|
|
struct route *ro;
|
|
|
|
|
|
|
|
sp = ipsec4_getpolicybyaddr(mcopy,
|
2003-07-03 09:03:53 +04:00
|
|
|
IPSEC_DIR_OUTBOUND, IP_FORWARDING,
|
|
|
|
&ipsecerror);
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
if (sp == NULL)
|
|
|
|
destifp = ipforward_rt.ro_rt->rt_ifp;
|
|
|
|
else {
|
|
|
|
/* count IPsec header size */
|
2000-01-31 17:18:52 +03:00
|
|
|
ipsechdr = ipsec4_hdrsiz(mcopy,
|
2003-07-03 09:03:53 +04:00
|
|
|
IPSEC_DIR_OUTBOUND, NULL);
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* find the correct route for outer IPv4
|
|
|
|
* header, compute tunnel MTU.
|
|
|
|
*
|
|
|
|
* XXX BUG ALERT
|
|
|
|
* The "dummyifp" code relies upon the fact
|
|
|
|
* that icmp_error() touches only ifp->if_mtu.
|
|
|
|
*/
|
|
|
|
/*XXX*/
|
|
|
|
destifp = NULL;
|
|
|
|
if (sp->req != NULL
|
2000-01-31 17:18:52 +03:00
|
|
|
&& sp->req->sav != NULL
|
|
|
|
&& sp->req->sav->sah != NULL) {
|
|
|
|
ro = &sp->req->sav->sah->sa_route;
|
1999-07-01 12:12:45 +04:00
|
|
|
if (ro->ro_rt && ro->ro_rt->rt_ifp) {
|
|
|
|
dummyifp.if_mtu =
|
2002-06-07 17:43:47 +04:00
|
|
|
ro->ro_rt->rt_rmx.rmx_mtu ?
|
|
|
|
ro->ro_rt->rt_rmx.rmx_mtu :
|
1999-07-01 12:12:45 +04:00
|
|
|
ro->ro_rt->rt_ifp->if_mtu;
|
|
|
|
dummyifp.if_mtu -= ipsechdr;
|
|
|
|
destifp = &dummyifp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-08-15 07:42:00 +04:00
|
|
|
#ifdef IPSEC
|
1999-07-01 12:12:45 +04:00
|
|
|
key_freesp(sp);
|
2003-08-15 07:42:00 +04:00
|
|
|
#else
|
|
|
|
KEY_FREESP(&sp);
|
|
|
|
#endif
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /*IPSEC*/
|
1993-03-21 12:45:37 +03:00
|
|
|
ipstat.ips_cantfrag++;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ENOBUFS:
|
2002-02-21 11:39:33 +03:00
|
|
|
#if 1
|
|
|
|
/*
|
|
|
|
* a router should not generate ICMP_SOURCEQUENCH as
|
|
|
|
* required in RFC1812 Requirements for IP Version 4 Routers.
|
|
|
|
* source quench could be a big problem under DoS attacks,
|
2002-05-12 19:48:36 +04:00
|
|
|
* or if the underlying interface is rate-limited.
|
2002-02-21 11:39:33 +03:00
|
|
|
*/
|
|
|
|
if (mcopy)
|
|
|
|
m_freem(mcopy);
|
|
|
|
return;
|
|
|
|
#else
|
1993-03-21 12:45:37 +03:00
|
|
|
type = ICMP_SOURCEQUENCH;
|
|
|
|
code = 0;
|
|
|
|
break;
|
2002-02-21 11:39:33 +03:00
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
icmp_error(mcopy, type, code, dest, destifp);
|
|
|
|
}
|
|
|
|
|
1997-01-11 08:21:07 +03:00
|
|
|
void
|
|
|
|
ip_savecontrol(inp, mp, ip, m)
|
2000-03-30 16:51:13 +04:00
|
|
|
struct inpcb *inp;
|
|
|
|
struct mbuf **mp;
|
|
|
|
struct ip *ip;
|
|
|
|
struct mbuf *m;
|
1997-01-11 08:21:07 +03:00
|
|
|
{
|
|
|
|
|
|
|
|
if (inp->inp_socket->so_options & SO_TIMESTAMP) {
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
microtime(&tv);
|
|
|
|
*mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv),
|
|
|
|
SCM_TIMESTAMP, SOL_SOCKET);
|
|
|
|
if (*mp)
|
|
|
|
mp = &(*mp)->m_next;
|
|
|
|
}
|
|
|
|
if (inp->inp_flags & INP_RECVDSTADDR) {
|
|
|
|
*mp = sbcreatecontrol((caddr_t) &ip->ip_dst,
|
|
|
|
sizeof(struct in_addr), IP_RECVDSTADDR, IPPROTO_IP);
|
|
|
|
if (*mp)
|
|
|
|
mp = &(*mp)->m_next;
|
|
|
|
}
|
|
|
|
#ifdef notyet
|
|
|
|
/*
|
|
|
|
* XXX
|
|
|
|
* Moving these out of udp_input() made them even more broken
|
|
|
|
* than they already were.
|
|
|
|
* - fenner@parc.xerox.com
|
|
|
|
*/
|
|
|
|
/* options were tossed already */
|
|
|
|
if (inp->inp_flags & INP_RECVOPTS) {
|
|
|
|
*mp = sbcreatecontrol((caddr_t) opts_deleted_above,
|
|
|
|
sizeof(struct in_addr), IP_RECVOPTS, IPPROTO_IP);
|
|
|
|
if (*mp)
|
|
|
|
mp = &(*mp)->m_next;
|
|
|
|
}
|
|
|
|
/* ip_srcroute doesn't do what we want here, need to fix */
|
|
|
|
if (inp->inp_flags & INP_RECVRETOPTS) {
|
|
|
|
*mp = sbcreatecontrol((caddr_t) ip_srcroute(),
|
|
|
|
sizeof(struct in_addr), IP_RECVRETOPTS, IPPROTO_IP);
|
|
|
|
if (*mp)
|
|
|
|
mp = &(*mp)->m_next;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (inp->inp_flags & INP_RECVIF) {
|
|
|
|
struct sockaddr_dl sdl;
|
|
|
|
|
|
|
|
sdl.sdl_len = offsetof(struct sockaddr_dl, sdl_data[0]);
|
|
|
|
sdl.sdl_family = AF_LINK;
|
|
|
|
sdl.sdl_index = m->m_pkthdr.rcvif ?
|
|
|
|
m->m_pkthdr.rcvif->if_index : 0;
|
|
|
|
sdl.sdl_nlen = sdl.sdl_alen = sdl.sdl_slen = 0;
|
|
|
|
*mp = sbcreatecontrol((caddr_t) &sdl, sdl.sdl_len,
|
|
|
|
IP_RECVIF, IPPROTO_IP);
|
|
|
|
if (*mp)
|
|
|
|
mp = &(*mp)->m_next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
/*
|
|
|
|
* sysctl helper routine for net.inet.ip.mtudisctimeout. checks the
|
|
|
|
* range of the new value and tweaks timers if it changes.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_net_inet_ip_pmtudto(SYSCTLFN_ARGS)
|
1994-05-13 10:02:48 +04:00
|
|
|
{
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
int error, tmp;
|
|
|
|
struct sysctlnode node;
|
|
|
|
|
|
|
|
node = *rnode;
|
|
|
|
tmp = ip_mtudisc_timeout;
|
|
|
|
node.sysctl_data = &tmp;
|
|
|
|
error = sysctl_lookup(SYSCTLFN_CALL(&node));
|
|
|
|
if (error || newp == NULL)
|
1998-01-05 12:52:02 +03:00
|
|
|
return (error);
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
if (tmp < 0)
|
|
|
|
return (EINVAL);
|
1998-06-01 04:39:37 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
ip_mtudisc_timeout = tmp;
|
|
|
|
rt_timer_queue_change(ip_mtudisc_timeout_q, ip_mtudisc_timeout);
|
1999-06-26 10:16:47 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
return (0);
|
|
|
|
}
|
2002-02-24 20:22:20 +03:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
#ifdef GATEWAY
|
|
|
|
/*
|
|
|
|
* sysctl helper routine for net.inet.ip.maxflows. apparently if
|
|
|
|
* maxflows is even looked up, we "reap flows".
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_net_inet_ip_maxflows(SYSCTLFN_ARGS)
|
|
|
|
{
|
|
|
|
int s;
|
2000-08-25 17:35:05 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
s = sysctl_lookup(SYSCTLFN_CALL(rnode));
|
|
|
|
if (s)
|
|
|
|
return (s);
|
|
|
|
|
|
|
|
s = splsoftnet();
|
|
|
|
ipflow_reap(0);
|
|
|
|
splx(s);
|
2001-03-27 06:24:38 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
#endif /* GATEWAY */
|
2003-11-12 18:00:05 +03:00
|
|
|
|
2003-11-10 23:03:29 +03:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
SYSCTL_SETUP(sysctl_net_inet_ip_setup, "sysctl net.inet.ip subtree setup")
|
|
|
|
{
|
|
|
|
extern int subnetsarelocal, hostzeroisbroadcast;
|
2003-11-19 21:39:34 +03:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
sysctl_createv(SYSCTL_PERMANENT,
|
|
|
|
CTLTYPE_NODE, "net", NULL,
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT,
|
|
|
|
CTLTYPE_NODE, "inet", NULL,
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT,
|
|
|
|
CTLTYPE_NODE, "ip", NULL,
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP, CTL_EOL);
|
|
|
|
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "forwarding", NULL,
|
|
|
|
NULL, 0, &ipforwarding, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_FORWARDING, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "redirect", NULL,
|
|
|
|
NULL, 0, &ipsendredirects, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_SENDREDIRECTS, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "ttl", NULL,
|
|
|
|
NULL, 0, &ip_defttl, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_DEFTTL, CTL_EOL);
|
|
|
|
#ifdef IPCTL_DEFMTU
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT /* |SYSCTL_READWRITE? */,
|
|
|
|
CTLTYPE_INT, "mtu", NULL,
|
|
|
|
NULL, 0, &ip_mtu, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_DEFMTU, CTL_EOL);
|
|
|
|
#endif /* IPCTL_DEFMTU */
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READONLY1,
|
|
|
|
CTLTYPE_INT, "forwsrcrt", NULL,
|
|
|
|
NULL, 0, &ip_forwsrcrt, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_FORWSRCRT, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "directed-broadcast", NULL,
|
|
|
|
NULL, 0, &ip_directedbcast, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_DIRECTEDBCAST, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "allowsrcrt", NULL,
|
|
|
|
NULL, 0, &ip_allowsrcrt, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_ALLOWSRCRT, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "subnetsarelocal", NULL,
|
|
|
|
NULL, 0, &subnetsarelocal, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_SUBNETSARELOCAL, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "mtudisc", NULL,
|
|
|
|
NULL, 0, &ip_mtudisc, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_MTUDISC, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "anonportmin", NULL,
|
|
|
|
sysctl_net_inet_ip_ports, 0, &anonportmin, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_ANONPORTMIN, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "anonportmax", NULL,
|
|
|
|
sysctl_net_inet_ip_ports, 0, &anonportmax, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_ANONPORTMAX, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "mtudisctimeout", NULL,
|
|
|
|
sysctl_net_inet_ip_pmtudto, 0, &ip_mtudisc_timeout, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_MTUDISCTIMEOUT, CTL_EOL);
|
|
|
|
#ifdef GATEWAY
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "maxflows", NULL,
|
|
|
|
sysctl_net_inet_ip_maxflows, 0, &ip_maxflows, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_MAXFLOWS, CTL_EOL);
|
|
|
|
#endif /* GATEWAY */
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "hostzerobroadcast", NULL,
|
|
|
|
NULL, 0, &hostzeroisbroadcast, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_HOSTZEROBROADCAST, CTL_EOL);
|
|
|
|
#if NGIF > 0
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "gifttl", NULL,
|
|
|
|
NULL, 0, &ip_gif_ttl, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_GIF_TTL, CTL_EOL);
|
|
|
|
#endif /* NGIF */
|
|
|
|
#ifndef IPNOPRIVPORTS
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "lowportmin", NULL,
|
|
|
|
sysctl_net_inet_ip_ports, 0, &lowportmin, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_LOWPORTMIN, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "lowportmax", NULL,
|
|
|
|
sysctl_net_inet_ip_ports, 0, &lowportmax, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_LOWPORTMAX, CTL_EOL);
|
|
|
|
#endif /* IPNOPRIVPORTS */
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "maxfragpackets", NULL,
|
|
|
|
NULL, 0, &ip_maxfragpackets, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_MAXFRAGPACKETS, CTL_EOL);
|
|
|
|
#if NGRE > 0
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "grettl", NULL,
|
|
|
|
NULL, 0, &ip_gre_ttl, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_GRE_TTL, CTL_EOL);
|
|
|
|
#endif /* NGRE */
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "checkinterface", NULL,
|
|
|
|
NULL, 0, &ip_checkinterface, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_CHECKINTERFACE, CTL_EOL);
|
|
|
|
sysctl_createv(SYSCTL_PERMANENT|SYSCTL_READWRITE,
|
|
|
|
CTLTYPE_INT, "random_id", NULL,
|
|
|
|
NULL, 0, &ip_do_randomid, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_RANDOMID, CTL_EOL);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|