2005-02-04 01:51:50 +03:00
|
|
|
/* $NetBSD: ip_icmp.c,v 1.90 2005/02/03 22:51:50 perry Exp $ */
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
1998-12-19 05:46:12 +03:00
|
|
|
|
|
|
|
/*-
|
2000-10-18 21:09:14 +04:00
|
|
|
* Copyright (c) 1998, 2000 The NetBSD Foundation, Inc.
|
1998-12-19 05:46:12 +03:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
* by Public Access Networks Corporation ("Panix"). It was developed under
|
|
|
|
* contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
|
|
|
|
*
|
2000-10-18 21:09:14 +04:00
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
* by Jason R. Thorpe of Zembu Labs, Inc.
|
|
|
|
*
|
1998-12-19 05:46:12 +03:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the NetBSD
|
|
|
|
* Foundation, Inc. and its contributors.
|
|
|
|
* 4. Neither the name of The NetBSD Foundation nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* Copyright (c) 1982, 1986, 1988, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1993-03-21 12:45:37 +03:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1994-06-29 10:29:24 +04:00
|
|
|
* @(#)ip_icmp.c 8.2 (Berkeley) 1/4/94
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
2001-11-13 03:32:34 +03:00
|
|
|
#include <sys/cdefs.h>
|
2005-02-04 01:51:50 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: ip_icmp.c,v 1.90 2005/02/03 22:51:50 perry Exp $");
|
2001-11-13 03:32:34 +03:00
|
|
|
|
1999-07-10 02:57:15 +04:00
|
|
|
#include "opt_ipsec.h"
|
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/kernel.h>
|
2001-10-30 09:41:09 +03:00
|
|
|
#include <sys/syslog.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <sys/sysctl.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <net/if.h>
|
1994-05-13 10:02:48 +04:00
|
|
|
#include <net/route.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_icmp.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <netinet/ip_var.h>
|
2000-01-25 20:07:56 +03:00
|
|
|
#include <netinet/in_pcb.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <netinet/icmp_var.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
#include <netinet6/ipsec.h>
|
|
|
|
#include <netkey/key.h>
|
|
|
|
#endif
|
|
|
|
|
2003-08-15 07:42:00 +04:00
|
|
|
#ifdef FAST_IPSEC
|
|
|
|
#include <netipsec/ipsec.h>
|
|
|
|
#include <netipsec/key.h>
|
|
|
|
#endif /* FAST_IPSEC*/
|
|
|
|
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <machine/stdarg.h>
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* ICMP routines: error generation, receive packet processing, and
|
|
|
|
* routines to turnaround packets back to the originator, and
|
|
|
|
* host table maintenance routines.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
|
|
int icmpmaskrepl = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
int icmpprintfs = 0;
|
|
|
|
#endif
|
2000-06-10 16:39:19 +04:00
|
|
|
int icmpreturndatabytes = 8;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2004-08-03 17:58:59 +04:00
|
|
|
struct icmpstat icmpstat;
|
|
|
|
|
2000-10-18 21:09:14 +04:00
|
|
|
/*
|
|
|
|
* List of callbacks to notify when Path MTU changes are made.
|
|
|
|
*/
|
2000-10-19 00:34:00 +04:00
|
|
|
struct icmp_mtudisc_callback {
|
|
|
|
LIST_ENTRY(icmp_mtudisc_callback) mc_list;
|
2005-02-03 00:41:55 +03:00
|
|
|
void (*mc_func)(struct in_addr);
|
2000-10-18 21:09:14 +04:00
|
|
|
};
|
|
|
|
|
2000-10-19 00:34:00 +04:00
|
|
|
LIST_HEAD(, icmp_mtudisc_callback) icmp_mtudisc_callbacks =
|
2000-10-18 21:09:14 +04:00
|
|
|
LIST_HEAD_INITIALIZER(&icmp_mtudisc_callbacks);
|
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
#if 0
|
2005-02-03 00:41:55 +03:00
|
|
|
static int ip_next_mtu(int, int);
|
1999-07-01 12:12:45 +04:00
|
|
|
#else
|
2005-02-03 00:41:55 +03:00
|
|
|
/*static*/ int ip_next_mtu(int, int);
|
1999-07-01 12:12:45 +04:00
|
|
|
#endif
|
|
|
|
|
2000-07-10 13:31:29 +04:00
|
|
|
extern int icmperrppslim;
|
|
|
|
static int icmperrpps_count = 0;
|
|
|
|
static struct timeval icmperrppslim_last;
|
2001-10-30 09:41:09 +03:00
|
|
|
static int icmp_rediraccept = 1;
|
2002-06-13 20:25:54 +04:00
|
|
|
static int icmp_redirtimeout = 600;
|
2001-10-30 09:41:09 +03:00
|
|
|
static struct rttimer_queue *icmp_redirect_timeout_q = NULL;
|
2000-02-15 07:03:49 +03:00
|
|
|
|
2005-02-03 00:41:55 +03:00
|
|
|
static void icmp_mtudisc_timeout(struct rtentry *, struct rttimer *);
|
|
|
|
static void icmp_redirect_timeout(struct rtentry *, struct rttimer *);
|
1997-10-18 02:12:14 +04:00
|
|
|
|
2005-02-03 00:41:55 +03:00
|
|
|
static int icmp_ratelimit(const struct in_addr *, const int, const int);
|
2000-02-15 07:03:49 +03:00
|
|
|
|
2001-10-30 09:41:09 +03:00
|
|
|
|
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_init(void)
|
2001-10-30 09:41:09 +03:00
|
|
|
{
|
2002-06-09 20:33:36 +04:00
|
|
|
/*
|
|
|
|
* This is only useful if the user initializes redirtimeout to
|
2001-10-30 09:41:09 +03:00
|
|
|
* something other than zero.
|
|
|
|
*/
|
|
|
|
if (icmp_redirtimeout != 0) {
|
2002-06-09 20:33:36 +04:00
|
|
|
icmp_redirect_timeout_q =
|
2001-10-30 09:41:09 +03:00
|
|
|
rt_timer_queue_create(icmp_redirtimeout);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-10-18 21:09:14 +04:00
|
|
|
/*
|
|
|
|
* Register a Path MTU Discovery callback.
|
|
|
|
*/
|
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_mtudisc_callback_register(void (*func)(struct in_addr))
|
2000-10-18 21:09:14 +04:00
|
|
|
{
|
2000-10-19 00:34:00 +04:00
|
|
|
struct icmp_mtudisc_callback *mc;
|
2000-10-18 21:09:14 +04:00
|
|
|
|
|
|
|
for (mc = LIST_FIRST(&icmp_mtudisc_callbacks); mc != NULL;
|
|
|
|
mc = LIST_NEXT(mc, mc_list)) {
|
|
|
|
if (mc->mc_func == func)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mc = malloc(sizeof(*mc), M_PCB, M_NOWAIT);
|
|
|
|
if (mc == NULL)
|
|
|
|
panic("icmp_mtudisc_callback_register");
|
|
|
|
|
|
|
|
mc->mc_func = func;
|
|
|
|
LIST_INSERT_HEAD(&icmp_mtudisc_callbacks, mc, mc_list);
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Generate an error packet of type error
|
|
|
|
* in response to bad packet ip.
|
|
|
|
*/
|
1994-01-09 02:50:41 +03:00
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_error(struct mbuf *n, int type, int code, n_long dest,
|
|
|
|
struct ifnet *destifp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *oip = mtod(n, struct ip *), *nip;
|
|
|
|
unsigned oiplen = oip->ip_hl << 2;
|
|
|
|
struct icmp *icp;
|
|
|
|
struct mbuf *m;
|
2000-07-24 07:32:31 +04:00
|
|
|
unsigned icmplen, mblen;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("icmp_error(%x, %d, %d)\n", oip, type, code);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
if (type != ICMP_REDIRECT)
|
|
|
|
icmpstat.icps_error++;
|
|
|
|
/*
|
2000-02-24 12:54:49 +03:00
|
|
|
* Don't send error if the original packet was encrypted.
|
1993-03-21 12:45:37 +03:00
|
|
|
* Don't send error if not the first fragment of message.
|
|
|
|
* Don't error if the old packet protocol was ICMP
|
|
|
|
* error message, only known informational types.
|
|
|
|
*/
|
2000-02-24 12:54:49 +03:00
|
|
|
if (n->m_flags & M_DECRYPTED)
|
|
|
|
goto freeit;
|
2002-08-14 04:23:27 +04:00
|
|
|
if (oip->ip_off &~ htons(IP_MF|IP_DF))
|
1993-03-21 12:45:37 +03:00
|
|
|
goto freeit;
|
|
|
|
if (oip->ip_p == IPPROTO_ICMP && type != ICMP_REDIRECT &&
|
|
|
|
n->m_len >= oiplen + ICMP_MINLEN &&
|
|
|
|
!ICMP_INFOTYPE(((struct icmp *)((caddr_t)oip + oiplen))->icmp_type)) {
|
|
|
|
icmpstat.icps_oldicmp++;
|
|
|
|
goto freeit;
|
|
|
|
}
|
1993-12-06 07:50:19 +03:00
|
|
|
/* Don't send error in response to a multicast or broadcast packet */
|
1994-05-13 10:02:48 +04:00
|
|
|
if (n->m_flags & (M_BCAST|M_MCAST))
|
1993-12-06 07:50:19 +03:00
|
|
|
goto freeit;
|
2000-02-15 07:03:49 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
2000-02-15 07:03:49 +03:00
|
|
|
* First, do a rate limitation check.
|
|
|
|
*/
|
|
|
|
if (icmp_ratelimit(&oip->ip_src, type, code)) {
|
|
|
|
/* XXX stat */
|
|
|
|
goto freeit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now, formulate icmp message
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
icmplen = oiplen + min(icmpreturndatabytes,
|
|
|
|
ntohs(oip->ip_len) - oiplen);
|
2000-07-24 07:32:31 +04:00
|
|
|
/*
|
2003-06-27 01:43:39 +04:00
|
|
|
* Defend against mbuf chains shorter than oip->ip_len - oiplen:
|
2000-07-24 07:32:31 +04:00
|
|
|
*/
|
|
|
|
mblen = 0;
|
|
|
|
for (m = n; m && (mblen < icmplen); m = m->m_next)
|
|
|
|
mblen += m->m_len;
|
|
|
|
icmplen = min(mblen, icmplen);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As we are not required to return everything we have,
|
|
|
|
* we return whatever we can return at ease.
|
|
|
|
*
|
|
|
|
* Note that ICMP datagrams longer than 576 octets are out of spec
|
|
|
|
* according to RFC1812; the limit on icmpreturndatabytes below in
|
|
|
|
* icmp_sysctl will keep things below that limit.
|
|
|
|
*/
|
|
|
|
|
|
|
|
KASSERT(ICMP_MINLEN <= MCLBYTES);
|
|
|
|
|
|
|
|
if (icmplen + ICMP_MINLEN > MCLBYTES)
|
|
|
|
icmplen = MCLBYTES - ICMP_MINLEN;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
m = m_gethdr(M_DONTWAIT, MT_HEADER);
|
2000-07-24 07:32:31 +04:00
|
|
|
if (m && (icmplen + ICMP_MINLEN > MHLEN)) {
|
|
|
|
MCLGET(m, M_DONTWAIT);
|
|
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
|
|
m_freem(m);
|
|
|
|
m = NULL;
|
|
|
|
}
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
if (m == NULL)
|
|
|
|
goto freeit;
|
2003-02-26 09:31:08 +03:00
|
|
|
MCLAIM(m, n->m_owner);
|
1993-03-21 12:45:37 +03:00
|
|
|
m->m_len = icmplen + ICMP_MINLEN;
|
2000-07-24 07:32:31 +04:00
|
|
|
if ((m->m_flags & M_EXT) == 0)
|
|
|
|
MH_ALIGN(m, m->m_len);
|
1993-03-21 12:45:37 +03:00
|
|
|
icp = mtod(m, struct icmp *);
|
|
|
|
if ((u_int)type > ICMP_MAXTYPE)
|
|
|
|
panic("icmp_error");
|
|
|
|
icmpstat.icps_outhist[type]++;
|
|
|
|
icp->icmp_type = type;
|
|
|
|
if (type == ICMP_REDIRECT)
|
1994-05-13 10:02:48 +04:00
|
|
|
icp->icmp_gwaddr.s_addr = dest;
|
|
|
|
else {
|
1993-03-21 12:45:37 +03:00
|
|
|
icp->icmp_void = 0;
|
2002-06-09 20:33:36 +04:00
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* The following assignments assume an overlay with the
|
|
|
|
* zeroed icmp_void field.
|
|
|
|
*/
|
|
|
|
if (type == ICMP_PARAMPROB) {
|
|
|
|
icp->icmp_pptr = code;
|
|
|
|
code = 0;
|
|
|
|
} else if (type == ICMP_UNREACH &&
|
1995-05-15 05:25:21 +04:00
|
|
|
code == ICMP_UNREACH_NEEDFRAG && destifp)
|
1994-05-13 10:02:48 +04:00
|
|
|
icp->icmp_nextmtu = htons(destifp->if_mtu);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
icp->icmp_code = code;
|
2000-06-10 16:39:19 +04:00
|
|
|
m_copydata(n, 0, icmplen, (caddr_t)&icp->icmp_ip);
|
1993-03-21 12:45:37 +03:00
|
|
|
nip = &icp->icmp_ip;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now, copy old ip header (without options)
|
|
|
|
* in front of icmp message.
|
|
|
|
*/
|
|
|
|
if (m->m_data - sizeof(struct ip) < m->m_pktdat)
|
|
|
|
panic("icmp len");
|
|
|
|
m->m_data -= sizeof(struct ip);
|
|
|
|
m->m_len += sizeof(struct ip);
|
|
|
|
m->m_pkthdr.len = m->m_len;
|
|
|
|
m->m_pkthdr.rcvif = n->m_pkthdr.rcvif;
|
|
|
|
nip = mtod(m, struct ip *);
|
2000-06-10 16:39:19 +04:00
|
|
|
/* ip_v set in ip_output */
|
1993-03-21 12:45:37 +03:00
|
|
|
nip->ip_hl = sizeof(struct ip) >> 2;
|
1994-05-13 10:02:48 +04:00
|
|
|
nip->ip_tos = 0;
|
2002-08-14 04:23:27 +04:00
|
|
|
nip->ip_len = htons(m->m_len);
|
2000-06-10 16:39:19 +04:00
|
|
|
/* ip_id set in ip_output */
|
2002-08-14 04:23:27 +04:00
|
|
|
nip->ip_off = htons(0);
|
2000-06-10 16:39:19 +04:00
|
|
|
/* ip_ttl set in icmp_reflect */
|
|
|
|
nip->ip_p = IPPROTO_ICMP;
|
|
|
|
nip->ip_src = oip->ip_src;
|
|
|
|
nip->ip_dst = oip->ip_dst;
|
1993-03-21 12:45:37 +03:00
|
|
|
icmp_reflect(m);
|
|
|
|
|
|
|
|
freeit:
|
|
|
|
m_freem(n);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct sockaddr_in icmpsrc = { sizeof (struct sockaddr_in), AF_INET };
|
|
|
|
static struct sockaddr_in icmpdst = { sizeof (struct sockaddr_in), AF_INET };
|
|
|
|
static struct sockaddr_in icmpgw = { sizeof (struct sockaddr_in), AF_INET };
|
|
|
|
struct sockaddr_in icmpmask = { 8, 0 };
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Process a received ICMP message.
|
|
|
|
*/
|
1994-01-09 02:50:41 +03:00
|
|
|
void
|
1996-02-14 02:40:59 +03:00
|
|
|
icmp_input(struct mbuf *m, ...)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
1999-07-01 12:12:45 +04:00
|
|
|
int proto;
|
2000-03-30 16:51:13 +04:00
|
|
|
struct icmp *icp;
|
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
1999-01-20 02:03:20 +03:00
|
|
|
int icmplen;
|
2000-03-30 16:51:13 +04:00
|
|
|
int i;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct in_ifaddr *ia;
|
2005-02-03 00:41:55 +03:00
|
|
|
void *(*ctlfunc)(int, struct sockaddr *, void *);
|
1994-05-13 10:02:48 +04:00
|
|
|
int code;
|
1996-02-14 02:40:59 +03:00
|
|
|
int hlen;
|
|
|
|
va_list ap;
|
2001-10-30 09:41:09 +03:00
|
|
|
struct rtentry *rt;
|
1996-02-14 02:40:59 +03:00
|
|
|
|
|
|
|
va_start(ap, m);
|
|
|
|
hlen = va_arg(ap, int);
|
1999-07-01 12:12:45 +04:00
|
|
|
proto = va_arg(ap, int);
|
1996-02-14 02:40:59 +03:00
|
|
|
va_end(ap);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Locate icmp structure in mbuf, and check
|
|
|
|
* that not corrupted and of at least minimum length.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
icmplen = ntohs(ip->ip_len) - hlen;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("icmp_input from %x to %x, len %d\n",
|
1996-09-09 18:51:07 +04:00
|
|
|
ntohl(ip->ip_src.s_addr), ntohl(ip->ip_dst.s_addr),
|
|
|
|
icmplen);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
if (icmplen < ICMP_MINLEN) {
|
|
|
|
icmpstat.icps_tooshort++;
|
|
|
|
goto freeit;
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
i = hlen + min(icmplen, ICMP_ADVLENMIN);
|
1996-09-09 18:51:07 +04:00
|
|
|
if (m->m_len < i && (m = m_pullup(m, i)) == 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
icmpstat.icps_tooshort++;
|
|
|
|
return;
|
|
|
|
}
|
1994-01-09 00:21:28 +03:00
|
|
|
ip = mtod(m, struct ip *);
|
1993-03-21 12:45:37 +03:00
|
|
|
m->m_len -= hlen;
|
|
|
|
m->m_data += hlen;
|
|
|
|
icp = mtod(m, struct icmp *);
|
Changes to allow the IPv4 and IPv6 layers to align headers themseves,
as necessary:
* Implement a new mbuf utility routine, m_copyup(), is is like
m_pullup(), except that it always prepends and copies, rather
than only doing so if the desired length is larger than m->m_len.
m_copyup() also allows an offset into the destination mbuf, which
allows space for packet headers, in the forwarding case.
* Add *_HDR_ALIGNED_P() macros for IP, IPv6, ICMP, and IGMP. These
macros expand to 1 if __NO_STRICT_ALIGNMENT is defined, so that
architectures which do not have strict alignment constraints don't
pay for the test or visit the new align-if-needed path.
* Use the new macros to check if a header needs to be aligned, or to
assert that it already is, as appropriate.
Note: This code is still somewhat experimental. However, the new
code path won't be visited if individual device drivers continue
to guarantee that packets are delivered to layer 3 already properly
aligned (which are rules that are already in use).
2002-07-01 02:40:32 +04:00
|
|
|
/* Don't need to assert alignment, here. */
|
1993-03-21 12:45:37 +03:00
|
|
|
if (in_cksum(m, icmplen)) {
|
|
|
|
icmpstat.icps_checksum++;
|
|
|
|
goto freeit;
|
|
|
|
}
|
|
|
|
m->m_len += hlen;
|
|
|
|
m->m_data -= hlen;
|
|
|
|
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
/*
|
|
|
|
* Message type specific processing.
|
|
|
|
*/
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("icmp_input, type %d code %d\n", icp->icmp_type,
|
1993-03-21 12:45:37 +03:00
|
|
|
icp->icmp_code);
|
|
|
|
#endif
|
|
|
|
if (icp->icmp_type > ICMP_MAXTYPE)
|
|
|
|
goto raw;
|
|
|
|
icmpstat.icps_inhist[icp->icmp_type]++;
|
|
|
|
code = icp->icmp_code;
|
|
|
|
switch (icp->icmp_type) {
|
|
|
|
|
|
|
|
case ICMP_UNREACH:
|
1994-05-13 10:02:48 +04:00
|
|
|
switch (code) {
|
|
|
|
case ICMP_UNREACH_NET:
|
|
|
|
case ICMP_UNREACH_HOST:
|
|
|
|
case ICMP_UNREACH_PROTOCOL:
|
|
|
|
case ICMP_UNREACH_PORT:
|
|
|
|
case ICMP_UNREACH_SRCFAIL:
|
|
|
|
code += PRC_UNREACH_NET;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP_UNREACH_NEEDFRAG:
|
|
|
|
code = PRC_MSGSIZE;
|
|
|
|
break;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
case ICMP_UNREACH_NET_UNKNOWN:
|
|
|
|
case ICMP_UNREACH_NET_PROHIB:
|
|
|
|
case ICMP_UNREACH_TOSNET:
|
|
|
|
code = PRC_UNREACH_NET;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP_UNREACH_HOST_UNKNOWN:
|
|
|
|
case ICMP_UNREACH_ISOLATED:
|
|
|
|
case ICMP_UNREACH_HOST_PROHIB:
|
|
|
|
case ICMP_UNREACH_TOSHOST:
|
|
|
|
code = PRC_UNREACH_HOST;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
goto badcode;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
goto deliver;
|
|
|
|
|
|
|
|
case ICMP_TIMXCEED:
|
|
|
|
if (code > 1)
|
|
|
|
goto badcode;
|
|
|
|
code += PRC_TIMXCEED_INTRANS;
|
|
|
|
goto deliver;
|
|
|
|
|
|
|
|
case ICMP_PARAMPROB:
|
1994-05-13 10:02:48 +04:00
|
|
|
if (code > 1)
|
1993-03-21 12:45:37 +03:00
|
|
|
goto badcode;
|
|
|
|
code = PRC_PARAMPROB;
|
|
|
|
goto deliver;
|
|
|
|
|
|
|
|
case ICMP_SOURCEQUENCH:
|
|
|
|
if (code)
|
|
|
|
goto badcode;
|
|
|
|
code = PRC_QUENCH;
|
1996-09-09 18:51:07 +04:00
|
|
|
goto deliver;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
deliver:
|
|
|
|
/*
|
|
|
|
* Problem with datagram; advise higher level routines.
|
|
|
|
*/
|
|
|
|
if (icmplen < ICMP_ADVLENMIN || icmplen < ICMP_ADVLEN(icp) ||
|
|
|
|
icp->icmp_ip.ip_hl < (sizeof(struct ip) >> 2)) {
|
|
|
|
icmpstat.icps_badlen++;
|
|
|
|
goto freeit;
|
|
|
|
}
|
1995-06-02 01:35:34 +04:00
|
|
|
if (IN_MULTICAST(icp->icmp_ip.ip_dst.s_addr))
|
1995-06-01 01:50:34 +04:00
|
|
|
goto badcode;
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("deliver to protocol %d\n", icp->icmp_ip.ip_p);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
icmpsrc.sin_addr = icp->icmp_ip.ip_dst;
|
1996-02-14 02:40:59 +03:00
|
|
|
ctlfunc = inetsw[ip_protox[icp->icmp_ip.ip_p]].pr_ctlinput;
|
|
|
|
if (ctlfunc)
|
2000-10-18 21:09:14 +04:00
|
|
|
(void) (*ctlfunc)(code, sintosa(&icmpsrc),
|
|
|
|
&icp->icmp_ip);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
badcode:
|
|
|
|
icmpstat.icps_badcode++;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP_ECHO:
|
|
|
|
icp->icmp_type = ICMP_ECHOREPLY;
|
|
|
|
goto reflect;
|
|
|
|
|
|
|
|
case ICMP_TSTAMP:
|
|
|
|
if (icmplen < ICMP_TSLEN) {
|
|
|
|
icmpstat.icps_badlen++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
icp->icmp_type = ICMP_TSTAMPREPLY;
|
|
|
|
icp->icmp_rtime = iptime();
|
|
|
|
icp->icmp_ttime = icp->icmp_rtime; /* bogus, do later! */
|
|
|
|
goto reflect;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
case ICMP_MASKREQ:
|
|
|
|
if (icmpmaskrepl == 0)
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* We are not able to respond with all ones broadcast
|
|
|
|
* unless we receive it over a point-to-point interface.
|
|
|
|
*/
|
1997-06-24 05:26:19 +04:00
|
|
|
if (icmplen < ICMP_MASKLEN) {
|
|
|
|
icmpstat.icps_badlen++;
|
1994-05-13 10:02:48 +04:00
|
|
|
break;
|
1997-06-24 05:26:19 +04:00
|
|
|
}
|
1995-06-02 01:46:27 +04:00
|
|
|
if (ip->ip_dst.s_addr == INADDR_BROADCAST ||
|
1996-09-09 18:51:07 +04:00
|
|
|
in_nullhost(ip->ip_dst))
|
1994-05-13 10:02:48 +04:00
|
|
|
icmpdst.sin_addr = ip->ip_src;
|
1995-06-02 01:46:27 +04:00
|
|
|
else
|
1994-05-13 10:02:48 +04:00
|
|
|
icmpdst.sin_addr = ip->ip_dst;
|
1995-06-04 09:06:49 +04:00
|
|
|
ia = ifatoia(ifaof_ifpforaddr(sintosa(&icmpdst),
|
|
|
|
m->m_pkthdr.rcvif));
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ia == 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
icp->icmp_type = ICMP_MASKREPLY;
|
|
|
|
icp->icmp_mask = ia->ia_sockmask.sin_addr.s_addr;
|
1996-09-09 18:51:07 +04:00
|
|
|
if (in_nullhost(ip->ip_src)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ia->ia_ifp->if_flags & IFF_BROADCAST)
|
1995-06-04 09:58:20 +04:00
|
|
|
ip->ip_src = ia->ia_broadaddr.sin_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
else if (ia->ia_ifp->if_flags & IFF_POINTOPOINT)
|
1995-06-04 09:58:20 +04:00
|
|
|
ip->ip_src = ia->ia_dstaddr.sin_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
reflect:
|
|
|
|
icmpstat.icps_reflect++;
|
|
|
|
icmpstat.icps_outhist[icp->icmp_type]++;
|
|
|
|
icmp_reflect(m);
|
|
|
|
return;
|
|
|
|
|
|
|
|
case ICMP_REDIRECT:
|
1994-05-13 10:02:48 +04:00
|
|
|
if (code > 3)
|
|
|
|
goto badcode;
|
2001-10-30 09:41:09 +03:00
|
|
|
if (icmp_rediraccept == 0)
|
|
|
|
goto freeit;
|
1994-05-13 10:02:48 +04:00
|
|
|
if (icmplen < ICMP_ADVLENMIN || icmplen < ICMP_ADVLEN(icp) ||
|
|
|
|
icp->icmp_ip.ip_hl < (sizeof(struct ip) >> 2)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
icmpstat.icps_badlen++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Short circuit routing redirects to force
|
|
|
|
* immediate change in the kernel's routing
|
|
|
|
* tables. The message is also handed to anyone
|
|
|
|
* listening on a raw socket (e.g. the routing
|
|
|
|
* daemon for use in updating its tables).
|
|
|
|
*/
|
|
|
|
icmpgw.sin_addr = ip->ip_src;
|
|
|
|
icmpdst.sin_addr = icp->icmp_gwaddr;
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("redirect dst %x to %x\n", icp->icmp_ip.ip_dst,
|
1996-09-09 18:51:07 +04:00
|
|
|
icp->icmp_gwaddr);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
1994-05-13 10:02:48 +04:00
|
|
|
icmpsrc.sin_addr = icp->icmp_ip.ip_dst;
|
2001-10-30 09:41:09 +03:00
|
|
|
rt = NULL;
|
1995-06-04 09:06:49 +04:00
|
|
|
rtredirect(sintosa(&icmpsrc), sintosa(&icmpdst),
|
1995-05-15 05:25:21 +04:00
|
|
|
(struct sockaddr *)0, RTF_GATEWAY | RTF_HOST,
|
2001-10-30 09:41:09 +03:00
|
|
|
sintosa(&icmpgw), (struct rtentry **)&rt);
|
|
|
|
if (rt != NULL && icmp_redirtimeout != 0) {
|
2002-06-09 20:33:36 +04:00
|
|
|
i = rt_timer_add(rt, icmp_redirect_timeout,
|
2001-10-30 09:41:09 +03:00
|
|
|
icmp_redirect_timeout_q);
|
|
|
|
if (i)
|
|
|
|
log(LOG_ERR, "ICMP: redirect failed to "
|
|
|
|
"register timeout for route to %x, "
|
2002-06-09 20:33:36 +04:00
|
|
|
"code %d\n",
|
2001-10-30 09:41:09 +03:00
|
|
|
icp->icmp_ip.ip_dst.s_addr, i);
|
|
|
|
}
|
|
|
|
if (rt != NULL)
|
|
|
|
rtfree(rt);
|
|
|
|
|
1995-06-04 09:06:49 +04:00
|
|
|
pfctlinput(PRC_REDIRECT_HOST, sintosa(&icmpsrc));
|
2003-08-15 07:42:00 +04:00
|
|
|
#if defined(IPSEC) || defined(FAST_IPSEC)
|
1999-07-01 12:12:45 +04:00
|
|
|
key_sa_routechange((struct sockaddr *)&icmpsrc);
|
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No kernel processing for the following;
|
|
|
|
* just fall through to send to raw listener.
|
|
|
|
*/
|
|
|
|
case ICMP_ECHOREPLY:
|
1994-05-13 10:02:48 +04:00
|
|
|
case ICMP_ROUTERADVERT:
|
|
|
|
case ICMP_ROUTERSOLICIT:
|
1993-03-21 12:45:37 +03:00
|
|
|
case ICMP_TSTAMPREPLY:
|
|
|
|
case ICMP_IREQREPLY:
|
|
|
|
case ICMP_MASKREPLY:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
raw:
|
1999-07-01 12:12:45 +04:00
|
|
|
rip_input(m, hlen, proto);
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
|
|
|
|
|
|
|
freeit:
|
|
|
|
m_freem(m);
|
1999-07-01 12:12:45 +04:00
|
|
|
return;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reflect the ip packet back to the source
|
|
|
|
*/
|
1994-01-09 02:50:41 +03:00
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_reflect(struct mbuf *m)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct ifaddr *ifa;
|
2000-01-25 20:07:56 +03:00
|
|
|
struct sockaddr_in *sin = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct in_addr t;
|
1996-02-14 02:40:59 +03:00
|
|
|
struct mbuf *opts = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
int optlen = (ip->ip_hl << 2) - sizeof(struct ip);
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
if (!in_canforward(ip->ip_src) &&
|
1995-06-02 01:35:34 +04:00
|
|
|
((ip->ip_src.s_addr & IN_CLASSA_NET) !=
|
|
|
|
htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))) {
|
1994-05-13 10:02:48 +04:00
|
|
|
m_freem(m); /* Bad return address */
|
1995-05-15 05:25:21 +04:00
|
|
|
goto done; /* ip_output() will check for broadcast */
|
1994-05-13 10:02:48 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
t = ip->ip_dst;
|
|
|
|
ip->ip_dst = ip->ip_src;
|
|
|
|
/*
|
2000-01-25 20:07:56 +03:00
|
|
|
* If the incoming packet was addressed directly to us, use
|
|
|
|
* dst as the src for the reply. Otherwise (broadcast or
|
|
|
|
* anonymous), use an address which corresponds to the
|
|
|
|
* incoming interface, with a preference for the address which
|
|
|
|
* corresponds to the route to the destination of the ICMP.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2000-01-25 20:07:56 +03:00
|
|
|
|
|
|
|
/* Look for packet addressed to us */
|
1998-02-13 21:21:38 +03:00
|
|
|
INADDR_TO_IA(t, ia);
|
2000-01-25 20:07:56 +03:00
|
|
|
|
|
|
|
/* look for packet sent to broadcast address */
|
2004-06-25 19:24:41 +04:00
|
|
|
if (ia == NULL && m->m_pkthdr.rcvif &&
|
|
|
|
(m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST)) {
|
2005-01-25 00:25:09 +03:00
|
|
|
IFADDR_FOREACH(ifa, m->m_pkthdr.rcvif) {
|
1998-02-13 21:21:38 +03:00
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
2000-01-25 20:07:56 +03:00
|
|
|
if (in_hosteq(t,ifatoia(ifa)->ia_broadaddr.sin_addr)) {
|
|
|
|
ia = ifatoia(ifa);
|
1998-02-13 21:21:38 +03:00
|
|
|
break;
|
2000-01-25 20:07:56 +03:00
|
|
|
}
|
1998-02-13 21:21:38 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1998-02-13 21:21:38 +03:00
|
|
|
|
2000-01-25 20:07:56 +03:00
|
|
|
if (ia)
|
|
|
|
sin = &ia->ia_addr;
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
icmpdst.sin_addr = t;
|
2000-01-25 20:07:56 +03:00
|
|
|
|
2002-08-14 04:23:27 +04:00
|
|
|
/*
|
|
|
|
* if the packet is addressed somewhere else, compute the
|
|
|
|
* source address for packets routed back to the source, and
|
|
|
|
* use that, if it's an address on the interface which
|
|
|
|
* received the packet
|
|
|
|
*/
|
2004-06-25 19:43:00 +04:00
|
|
|
if (sin == (struct sockaddr_in *)0 && m->m_pkthdr.rcvif) {
|
2000-01-25 20:07:56 +03:00
|
|
|
struct sockaddr_in sin_dst;
|
|
|
|
struct route icmproute;
|
|
|
|
int errornum;
|
|
|
|
|
|
|
|
sin_dst.sin_family = AF_INET;
|
|
|
|
sin_dst.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
sin_dst.sin_addr = ip->ip_dst;
|
|
|
|
bzero(&icmproute, sizeof(icmproute));
|
|
|
|
errornum = 0;
|
|
|
|
sin = in_selectsrc(&sin_dst, &icmproute, 0, NULL, &errornum);
|
|
|
|
/* errornum is never used */
|
|
|
|
if (icmproute.ro_rt)
|
|
|
|
RTFREE(icmproute.ro_rt);
|
|
|
|
/* check to make sure sin is a source address on rcvif */
|
|
|
|
if (sin) {
|
|
|
|
t = sin->sin_addr;
|
|
|
|
sin = (struct sockaddr_in *)0;
|
|
|
|
INADDR_TO_IA(t, ia);
|
|
|
|
while (ia) {
|
|
|
|
if (ia->ia_ifp == m->m_pkthdr.rcvif) {
|
|
|
|
sin = &ia->ia_addr;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
NEXT_IA_WITH_SAME_ADDR(ia);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-08-14 04:23:27 +04:00
|
|
|
/*
|
|
|
|
* if it was not addressed to us, but the route doesn't go out
|
|
|
|
* the source interface, pick an address on the source
|
|
|
|
* interface. This can happen when routing is asymmetric, or
|
|
|
|
* when the incoming packet was encapsulated
|
|
|
|
*/
|
2004-06-25 19:43:00 +04:00
|
|
|
if (sin == (struct sockaddr_in *)0 && m->m_pkthdr.rcvif) {
|
2005-01-25 00:25:09 +03:00
|
|
|
IFADDR_FOREACH(ifa, m->m_pkthdr.rcvif) {
|
2000-01-25 20:07:56 +03:00
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
|
|
|
sin = &(ifatoia(ifa)->ia_addr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
/*
|
|
|
|
* The following happens if the packet was not addressed to us,
|
1998-02-13 21:21:38 +03:00
|
|
|
* and was received on an interface with no IP address:
|
|
|
|
* We find the first AF_INET address on the first non-loopback
|
|
|
|
* interface.
|
1994-05-13 10:02:48 +04:00
|
|
|
*/
|
2000-01-25 20:07:56 +03:00
|
|
|
if (sin == (struct sockaddr_in *)0)
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
|
1998-02-13 21:21:38 +03:00
|
|
|
if (ia->ia_ifp->if_flags & IFF_LOOPBACK)
|
|
|
|
continue;
|
2000-01-25 20:07:56 +03:00
|
|
|
sin = &ia->ia_addr;
|
1998-02-13 21:21:38 +03:00
|
|
|
break;
|
|
|
|
}
|
2000-01-25 20:07:56 +03:00
|
|
|
|
1999-03-30 23:02:56 +04:00
|
|
|
/*
|
|
|
|
* If we still didn't find an address, punt. We could have an
|
|
|
|
* interface up (and receiving packets) with no address.
|
|
|
|
*/
|
2000-01-25 20:07:56 +03:00
|
|
|
if (sin == (struct sockaddr_in *)0) {
|
1999-03-30 23:02:56 +04:00
|
|
|
m_freem(m);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2000-01-25 20:07:56 +03:00
|
|
|
ip->ip_src = sin->sin_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
ip->ip_ttl = MAXTTL;
|
|
|
|
|
|
|
|
if (optlen > 0) {
|
2000-03-30 16:51:13 +04:00
|
|
|
u_char *cp;
|
1993-03-21 12:45:37 +03:00
|
|
|
int opt, cnt;
|
|
|
|
u_int len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Retrieve any source routing from the incoming packet;
|
|
|
|
* add on any record-route or timestamp options.
|
|
|
|
*/
|
|
|
|
cp = (u_char *) (ip + 1);
|
|
|
|
if ((opts = ip_srcroute()) == 0 &&
|
|
|
|
(opts = m_gethdr(M_DONTWAIT, MT_HEADER))) {
|
2003-02-26 09:31:08 +03:00
|
|
|
MCLAIM(opts, m->m_owner);
|
1993-03-21 12:45:37 +03:00
|
|
|
opts->m_len = sizeof(struct in_addr);
|
1996-09-09 18:51:07 +04:00
|
|
|
*mtod(opts, struct in_addr *) = zeroin_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
if (opts) {
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("icmp_reflect optlen %d rt %d => ",
|
1993-03-21 12:45:37 +03:00
|
|
|
optlen, opts->m_len);
|
|
|
|
#endif
|
|
|
|
for (cnt = optlen; cnt > 0; cnt -= len, cp += len) {
|
|
|
|
opt = cp[IPOPT_OPTVAL];
|
|
|
|
if (opt == IPOPT_EOL)
|
|
|
|
break;
|
|
|
|
if (opt == IPOPT_NOP)
|
|
|
|
len = 1;
|
|
|
|
else {
|
2000-05-10 07:31:30 +04:00
|
|
|
if (cnt < IPOPT_OLEN + sizeof(*cp))
|
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
len = cp[IPOPT_OLEN];
|
2000-05-10 07:31:30 +04:00
|
|
|
if (len < IPOPT_OLEN + sizeof(*cp) ||
|
|
|
|
len > cnt)
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* Should check for overflow, but it "can't happen"
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2002-06-09 20:33:36 +04:00
|
|
|
if (opt == IPOPT_RR || opt == IPOPT_TS ||
|
1994-05-13 10:02:48 +04:00
|
|
|
opt == IPOPT_SECURITY) {
|
1993-03-21 12:45:37 +03:00
|
|
|
bcopy((caddr_t)cp,
|
|
|
|
mtod(opts, caddr_t) + opts->m_len, len);
|
|
|
|
opts->m_len += len;
|
|
|
|
}
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
/* Terminate & pad, if necessary */
|
1996-02-14 02:40:59 +03:00
|
|
|
if ((cnt = opts->m_len % 4) != 0) {
|
1994-05-13 10:02:48 +04:00
|
|
|
for (; cnt < 4; cnt++) {
|
|
|
|
*(mtod(opts, caddr_t) + opts->m_len) =
|
|
|
|
IPOPT_EOL;
|
|
|
|
opts->m_len++;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("%d\n", opts->m_len);
|
1993-03-21 12:45:37 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Now strip out original options by copying rest of first
|
|
|
|
* mbuf's data back, and adjust the IP length.
|
|
|
|
*/
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(ntohs(ip->ip_len) - optlen);
|
1993-03-21 12:45:37 +03:00
|
|
|
ip->ip_hl = sizeof(struct ip) >> 2;
|
|
|
|
m->m_len -= optlen;
|
|
|
|
if (m->m_flags & M_PKTHDR)
|
|
|
|
m->m_pkthdr.len -= optlen;
|
|
|
|
optlen += sizeof(struct ip);
|
|
|
|
bcopy((caddr_t)ip + optlen, (caddr_t)(ip + 1),
|
|
|
|
(unsigned)(m->m_len - sizeof(struct ip)));
|
|
|
|
}
|
2003-11-13 04:48:12 +03:00
|
|
|
m_tag_delete_nonpersistent(m);
|
1993-12-06 07:50:19 +03:00
|
|
|
m->m_flags &= ~(M_BCAST|M_MCAST);
|
2003-04-17 20:57:49 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Clear any in-bound checksum flags for this packet.
|
|
|
|
*/
|
2004-06-25 19:43:00 +04:00
|
|
|
if (m->m_flags & M_PKTHDR)
|
|
|
|
m->m_pkthdr.csum_flags = 0;
|
2003-04-17 20:57:49 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
icmp_send(m, opts);
|
1994-05-13 10:02:48 +04:00
|
|
|
done:
|
1993-03-21 12:45:37 +03:00
|
|
|
if (opts)
|
|
|
|
(void)m_free(opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Send an icmp packet back to the ip level,
|
|
|
|
* after supplying a checksum.
|
|
|
|
*/
|
1994-01-09 02:50:41 +03:00
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_send(struct mbuf *m, struct mbuf *opts)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ip *ip = mtod(m, struct ip *);
|
|
|
|
int hlen;
|
|
|
|
struct icmp *icp;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
hlen = ip->ip_hl << 2;
|
|
|
|
m->m_data += hlen;
|
|
|
|
m->m_len -= hlen;
|
|
|
|
icp = mtod(m, struct icmp *);
|
|
|
|
icp->icmp_cksum = 0;
|
2002-08-14 04:23:27 +04:00
|
|
|
icp->icmp_cksum = in_cksum(m, ntohs(ip->ip_len) - hlen);
|
1993-03-21 12:45:37 +03:00
|
|
|
m->m_data -= hlen;
|
|
|
|
m->m_len += hlen;
|
|
|
|
#ifdef ICMPPRINTFS
|
|
|
|
if (icmpprintfs)
|
1996-10-13 06:03:00 +04:00
|
|
|
printf("icmp_send dst %x src %x\n", ip->ip_dst, ip->ip_src);
|
2000-03-01 15:49:27 +03:00
|
|
|
#endif
|
2003-08-15 07:42:00 +04:00
|
|
|
(void) ip_output(m, opts, NULL, 0,
|
2003-08-23 01:53:01 +04:00
|
|
|
(struct ip_moptions *)NULL, (struct socket *)NULL);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
n_time
|
2005-02-04 01:51:50 +03:00
|
|
|
iptime(void)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
struct timeval atv;
|
|
|
|
u_long t;
|
|
|
|
|
|
|
|
microtime(&atv);
|
|
|
|
t = (atv.tv_sec % (24*60*60)) * 1000 + atv.tv_usec / 1000;
|
|
|
|
return (htonl(t));
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
/*
|
|
|
|
* sysctl helper routine for net.inet.icmp.returndatabytes. ensures
|
|
|
|
* that the new value is in the correct range.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_net_inet_icmp_returndatabytes(SYSCTLFN_ARGS)
|
1994-05-13 10:02:48 +04:00
|
|
|
{
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
int error, t;
|
|
|
|
struct sysctlnode node;
|
|
|
|
|
|
|
|
node = *rnode;
|
|
|
|
node.sysctl_data = &t;
|
|
|
|
t = icmpreturndatabytes;
|
|
|
|
error = sysctl_lookup(SYSCTLFN_CALL(&node));
|
|
|
|
if (error || newp == NULL)
|
|
|
|
return (error);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
if (t < 8 || t > 512)
|
|
|
|
return (EINVAL);
|
|
|
|
icmpreturndatabytes = t;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sysctl helper routine for net.inet.icmp.redirtimeout. ensures that
|
|
|
|
* the given value is not less than zero and then resets the timeout
|
|
|
|
* queue.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
sysctl_net_inet_icmp_redirtimeout(SYSCTLFN_ARGS)
|
|
|
|
{
|
|
|
|
int error, tmp;
|
|
|
|
struct sysctlnode node;
|
|
|
|
|
|
|
|
node = *rnode;
|
|
|
|
node.sysctl_data = &tmp;
|
|
|
|
tmp = icmp_redirtimeout;
|
|
|
|
error = sysctl_lookup(SYSCTLFN_CALL(&node));
|
|
|
|
if (error || newp == NULL)
|
2001-10-30 09:41:09 +03:00
|
|
|
return (error);
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
if (tmp < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
icmp_redirtimeout = tmp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* was it a *defined* side-effect that anyone even *reading*
|
|
|
|
* this value causes these things to happen?
|
|
|
|
*/
|
|
|
|
if (icmp_redirect_timeout_q != NULL) {
|
|
|
|
if (icmp_redirtimeout == 0) {
|
|
|
|
rt_timer_queue_destroy(icmp_redirect_timeout_q,
|
|
|
|
TRUE);
|
|
|
|
icmp_redirect_timeout_q = NULL;
|
|
|
|
} else {
|
|
|
|
rt_timer_queue_change(icmp_redirect_timeout_q,
|
|
|
|
icmp_redirtimeout);
|
|
|
|
}
|
|
|
|
} else if (icmp_redirtimeout > 0) {
|
|
|
|
icmp_redirect_timeout_q =
|
|
|
|
rt_timer_queue_create(icmp_redirtimeout);
|
1994-05-13 10:02:48 +04:00
|
|
|
}
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_SETUP(sysctl_net_inet_icmp_setup, "sysctl net.inet.icmp subtree setup")
|
|
|
|
{
|
|
|
|
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT,
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
CTLTYPE_NODE, "net", NULL,
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT,
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
CTLTYPE_NODE, "inet", NULL,
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_NODE, "icmp",
|
|
|
|
SYSCTL_DESCR("ICMPv4 related settings"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP, CTL_EOL);
|
|
|
|
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_INT, "maskrepl",
|
|
|
|
SYSCTL_DESCR("Respond to ICMP_MASKREQ messages"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
NULL, 0, &icmpmaskrepl, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP,
|
|
|
|
ICMPCTL_MASKREPL, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_INT, "returndatabytes",
|
|
|
|
SYSCTL_DESCR("Number of bytes to return in an ICMP "
|
|
|
|
"error message"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
sysctl_net_inet_icmp_returndatabytes, 0,
|
|
|
|
&icmpreturndatabytes, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP,
|
|
|
|
ICMPCTL_RETURNDATABYTES, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_INT, "errppslimit",
|
|
|
|
SYSCTL_DESCR("Maximum number of outgoing ICMP error "
|
|
|
|
"messages per second"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
NULL, 0, &icmperrppslim, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP,
|
|
|
|
ICMPCTL_ERRPPSLIMIT, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_INT, "rediraccept",
|
|
|
|
SYSCTL_DESCR("Accept ICMP_REDIRECT messages"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
NULL, 0, &icmp_rediraccept, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP,
|
|
|
|
ICMPCTL_REDIRACCEPT, CTL_EOL);
|
2004-03-24 18:34:46 +03:00
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
CTLTYPE_INT, "redirtimeout",
|
|
|
|
SYSCTL_DESCR("Lifetime of ICMP_REDIRECT generated "
|
|
|
|
"routes"),
|
Dynamic sysctl.
Gone are the old kern_sysctl(), cpu_sysctl(), hw_sysctl(),
vfs_sysctl(), etc, routines, along with sysctl_int() et al. Now all
nodes are registered with the tree, and nodes can be added (or
removed) easily, and I/O to and from the tree is handled generically.
Since the nodes are registered with the tree, the mapping from name to
number (and back again) can now be discovered, instead of having to be
hard coded. Adding new nodes to the tree is likewise much simpler --
the new infrastructure handles almost all the work for simple types,
and just about anything else can be done with a small helper function.
All existing nodes are where they were before (numerically speaking),
so all existing consumers of sysctl information should notice no
difference.
PS - I'm sorry, but there's a distinct lack of documentation at the
moment. I'm working on sysctl(3/8/9) right now, and I promise to
watch out for buses.
2003-12-04 22:38:21 +03:00
|
|
|
sysctl_net_inet_icmp_redirtimeout, 0,
|
|
|
|
&icmp_redirtimeout, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_ICMP,
|
|
|
|
ICMPCTL_REDIRTIMEOUT, CTL_EOL);
|
1994-05-13 10:02:48 +04:00
|
|
|
}
|
1997-10-18 02:12:14 +04:00
|
|
|
|
2001-11-04 16:38:50 +03:00
|
|
|
/* Table of common MTUs: */
|
|
|
|
|
|
|
|
static const u_int mtu_table[] = {
|
|
|
|
65535, 65280, 32000, 17914, 9180, 8166,
|
|
|
|
4352, 2002, 1492, 1006, 508, 296, 68, 0
|
|
|
|
};
|
|
|
|
|
2000-10-18 21:09:14 +04:00
|
|
|
void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_mtudisc(struct icmp *icp, struct in_addr faddr)
|
1997-10-18 02:12:14 +04:00
|
|
|
{
|
2000-10-19 00:34:00 +04:00
|
|
|
struct icmp_mtudisc_callback *mc;
|
1997-10-18 02:12:14 +04:00
|
|
|
struct sockaddr *dst = sintosa(&icmpsrc);
|
2000-10-18 21:09:14 +04:00
|
|
|
struct rtentry *rt;
|
1997-10-29 08:28:44 +03:00
|
|
|
u_long mtu = ntohs(icp->icmp_nextmtu); /* Why a long? IPv6 */
|
1998-04-29 07:44:11 +04:00
|
|
|
int error;
|
1997-10-18 02:12:14 +04:00
|
|
|
|
|
|
|
rt = rtalloc1(dst, 1);
|
|
|
|
if (rt == 0)
|
|
|
|
return;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
1997-10-18 02:12:14 +04:00
|
|
|
/* If we didn't get a host route, allocate one */
|
2002-06-09 20:33:36 +04:00
|
|
|
|
1997-10-18 02:12:14 +04:00
|
|
|
if ((rt->rt_flags & RTF_HOST) == 0) {
|
|
|
|
struct rtentry *nrt;
|
|
|
|
|
2002-06-09 20:33:36 +04:00
|
|
|
error = rtrequest((int) RTM_ADD, dst,
|
1997-10-18 02:12:14 +04:00
|
|
|
(struct sockaddr *) rt->rt_gateway,
|
2002-06-09 20:33:36 +04:00
|
|
|
(struct sockaddr *) 0,
|
1997-10-18 02:12:14 +04:00
|
|
|
RTF_GATEWAY | RTF_HOST | RTF_DYNAMIC, &nrt);
|
|
|
|
if (error) {
|
|
|
|
rtfree(rt);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
nrt->rt_rmx = rt->rt_rmx;
|
|
|
|
rtfree(rt);
|
|
|
|
rt = nrt;
|
|
|
|
}
|
1998-04-29 07:44:11 +04:00
|
|
|
error = rt_timer_add(rt, icmp_mtudisc_timeout, ip_mtudisc_timeout_q);
|
|
|
|
if (error) {
|
|
|
|
rtfree(rt);
|
|
|
|
return;
|
|
|
|
}
|
1997-10-18 02:12:14 +04:00
|
|
|
|
|
|
|
if (mtu == 0) {
|
|
|
|
int i = 0;
|
|
|
|
|
2002-08-14 04:23:27 +04:00
|
|
|
mtu = ntohs(icp->icmp_ip.ip_len);
|
1997-10-18 02:12:14 +04:00
|
|
|
/* Some 4.2BSD-based routers incorrectly adjust the ip_len */
|
|
|
|
if (mtu > rt->rt_rmx.rmx_mtu && rt->rt_rmx.rmx_mtu != 0)
|
|
|
|
mtu -= (icp->icmp_ip.ip_hl << 2);
|
|
|
|
|
1997-10-29 08:28:44 +03:00
|
|
|
/* If we still can't guess a value, try the route */
|
|
|
|
|
|
|
|
if (mtu == 0) {
|
1997-10-18 02:12:14 +04:00
|
|
|
mtu = rt->rt_rmx.rmx_mtu;
|
|
|
|
|
1997-10-29 08:28:44 +03:00
|
|
|
/* If no route mtu, default to the interface mtu */
|
|
|
|
|
|
|
|
if (mtu == 0)
|
|
|
|
mtu = rt->rt_ifp->if_mtu;
|
|
|
|
}
|
|
|
|
|
1997-10-18 02:12:14 +04:00
|
|
|
for (i = 0; i < sizeof(mtu_table) / sizeof(mtu_table[0]); i++)
|
1997-10-29 08:28:44 +03:00
|
|
|
if (mtu > mtu_table[i]) {
|
|
|
|
mtu = mtu_table[i];
|
1997-10-18 02:12:14 +04:00
|
|
|
break;
|
1997-10-29 08:28:44 +03:00
|
|
|
}
|
1997-10-18 02:12:14 +04:00
|
|
|
}
|
|
|
|
|
1998-04-29 07:44:11 +04:00
|
|
|
/*
|
|
|
|
* XXX: RTV_MTU is overloaded, since the admin can set it
|
|
|
|
* to turn off PMTU for a route, and the kernel can
|
|
|
|
* set it to indicate a serious problem with PMTU
|
|
|
|
* on a route. We should be using a separate flag
|
|
|
|
* for the kernel to indicate this.
|
|
|
|
*/
|
|
|
|
|
1997-10-18 02:12:14 +04:00
|
|
|
if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0) {
|
1997-10-29 08:28:44 +03:00
|
|
|
if (mtu < 296 || mtu > rt->rt_ifp->if_mtu)
|
1997-10-18 02:12:14 +04:00
|
|
|
rt->rt_rmx.rmx_locks |= RTV_MTU;
|
2002-06-09 20:33:36 +04:00
|
|
|
else if (rt->rt_rmx.rmx_mtu > mtu ||
|
2000-10-18 23:20:02 +04:00
|
|
|
rt->rt_rmx.rmx_mtu == 0) {
|
|
|
|
icmpstat.icps_pmtuchg++;
|
1997-10-18 02:12:14 +04:00
|
|
|
rt->rt_rmx.rmx_mtu = mtu;
|
2000-10-18 23:20:02 +04:00
|
|
|
}
|
1997-10-18 02:12:14 +04:00
|
|
|
}
|
1997-10-29 08:28:44 +03:00
|
|
|
|
1997-10-18 02:12:14 +04:00
|
|
|
if (rt)
|
|
|
|
rtfree(rt);
|
2000-10-18 21:09:14 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Notify protocols that the MTU for this destination
|
|
|
|
* has changed.
|
|
|
|
*/
|
|
|
|
for (mc = LIST_FIRST(&icmp_mtudisc_callbacks); mc != NULL;
|
|
|
|
mc = LIST_NEXT(mc, mc_list))
|
|
|
|
(*mc->mc_func)(faddr);
|
1997-10-18 02:12:14 +04:00
|
|
|
}
|
1998-04-29 07:44:11 +04:00
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
/*
|
|
|
|
* Return the next larger or smaller MTU plateau (table from RFC 1191)
|
|
|
|
* given current value MTU. If DIR is less than zero, a larger plateau
|
|
|
|
* is returned; otherwise, a smaller value is returned.
|
|
|
|
*/
|
|
|
|
int
|
2005-02-04 01:51:50 +03:00
|
|
|
ip_next_mtu(int mtu, int dir) /* XXX */
|
1999-07-01 12:12:45 +04:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2001-11-04 16:38:50 +03:00
|
|
|
for (i = 0; i < (sizeof mtu_table) / (sizeof mtu_table[0]); i++) {
|
|
|
|
if (mtu >= mtu_table[i])
|
1999-07-01 12:12:45 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dir < 0) {
|
|
|
|
if (i == 0) {
|
|
|
|
return 0;
|
|
|
|
} else {
|
2001-11-04 16:38:50 +03:00
|
|
|
return mtu_table[i - 1];
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
} else {
|
2001-11-04 16:38:50 +03:00
|
|
|
if (mtu_table[i] == 0) {
|
1999-07-01 12:12:45 +04:00
|
|
|
return 0;
|
2001-11-04 16:38:50 +03:00
|
|
|
} else if (mtu > mtu_table[i]) {
|
|
|
|
return mtu_table[i];
|
1999-07-01 12:12:45 +04:00
|
|
|
} else {
|
2001-11-04 16:38:50 +03:00
|
|
|
return mtu_table[i + 1];
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-04-29 07:44:11 +04:00
|
|
|
static void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_mtudisc_timeout(struct rtentry *rt, struct rttimer *r)
|
1998-04-29 07:44:11 +04:00
|
|
|
{
|
|
|
|
if (rt == NULL)
|
|
|
|
panic("icmp_mtudisc_timeout: bad route to timeout");
|
2002-06-09 20:33:36 +04:00
|
|
|
if ((rt->rt_flags & (RTF_DYNAMIC | RTF_HOST)) ==
|
1998-04-29 07:44:11 +04:00
|
|
|
(RTF_DYNAMIC | RTF_HOST)) {
|
|
|
|
rtrequest((int) RTM_DELETE, (struct sockaddr *)rt_key(rt),
|
|
|
|
rt->rt_gateway, rt_mask(rt), rt->rt_flags, 0);
|
|
|
|
} else {
|
|
|
|
if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0) {
|
|
|
|
rt->rt_rmx.rmx_mtu = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2000-02-15 07:03:49 +03:00
|
|
|
|
2001-10-30 09:41:09 +03:00
|
|
|
static void
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_redirect_timeout(struct rtentry *rt, struct rttimer *r)
|
2001-10-30 09:41:09 +03:00
|
|
|
{
|
|
|
|
if (rt == NULL)
|
|
|
|
panic("icmp_redirect_timeout: bad route to timeout");
|
2002-06-09 20:33:36 +04:00
|
|
|
if ((rt->rt_flags & (RTF_DYNAMIC | RTF_HOST)) ==
|
2001-10-30 09:41:09 +03:00
|
|
|
(RTF_DYNAMIC | RTF_HOST)) {
|
|
|
|
rtrequest((int) RTM_DELETE, (struct sockaddr *)rt_key(rt),
|
|
|
|
rt->rt_gateway, rt_mask(rt), rt->rt_flags, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-02-15 07:03:49 +03:00
|
|
|
/*
|
|
|
|
* Perform rate limit check.
|
|
|
|
* Returns 0 if it is okay to send the icmp packet.
|
|
|
|
* Returns 1 if the router SHOULD NOT send this icmp packet due to rate
|
|
|
|
* limitation.
|
|
|
|
*
|
|
|
|
* XXX per-destination/type check necessary?
|
|
|
|
*/
|
2005-02-04 01:51:50 +03:00
|
|
|
/* "type" and "code" are not used at this moment */
|
2000-02-15 07:03:49 +03:00
|
|
|
static int
|
2005-02-04 01:51:50 +03:00
|
|
|
icmp_ratelimit(const struct in_addr *dst, const int type, const int code)
|
2000-02-15 07:03:49 +03:00
|
|
|
{
|
|
|
|
|
2000-07-10 13:31:29 +04:00
|
|
|
/* PPS limit */
|
|
|
|
if (!ppsratecheck(&icmperrppslim_last, &icmperrpps_count,
|
|
|
|
icmperrppslim)) {
|
|
|
|
/* The packet is subject to rate limit */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2005-02-04 01:51:50 +03:00
|
|
|
/* okay to send */
|
2000-07-10 13:31:29 +04:00
|
|
|
return 0;
|
2000-02-15 07:03:49 +03:00
|
|
|
}
|