version 1.130.2.4, 2001/09/21 22:36:48 |
version 1.130.2.12, 2002/08/27 23:48:00 |
|
|
/* |
/* |
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. |
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. |
* All rights reserved. |
* All rights reserved. |
* |
* |
* Redistribution and use in source and binary forms, with or without |
* Redistribution and use in source and binary forms, with or without |
* modification, are permitted provided that the following conditions |
* modification, are permitted provided that the following conditions |
* are met: |
* are met: |
|
|
* 3. Neither the name of the project nor the names of its contributors |
* 3. Neither the name of the project nor the names of its contributors |
* may be used to endorse or promote products derived from this software |
* may be used to endorse or promote products derived from this software |
* without specific prior written permission. |
* without specific prior written permission. |
* |
* |
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
|
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94 |
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94 |
*/ |
*/ |
|
|
|
#include <sys/cdefs.h> |
|
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
#include "opt_gateway.h" |
#include "opt_gateway.h" |
#include "opt_pfil_hooks.h" |
#include "opt_pfil_hooks.h" |
#include "opt_ipsec.h" |
#include "opt_ipsec.h" |
|
|
#include <sys/errno.h> |
#include <sys/errno.h> |
#include <sys/time.h> |
#include <sys/time.h> |
#include <sys/kernel.h> |
#include <sys/kernel.h> |
#include <sys/proc.h> |
|
#include <sys/pool.h> |
#include <sys/pool.h> |
|
|
#include <uvm/uvm_extern.h> |
|
|
|
#include <sys/sysctl.h> |
#include <sys/sysctl.h> |
|
|
#include <net/if.h> |
#include <net/if.h> |
|
|
/* just for gif_ttl */ |
/* just for gif_ttl */ |
#include <netinet/in_gif.h> |
#include <netinet/in_gif.h> |
#include "gif.h" |
#include "gif.h" |
|
#include <net/if_gre.h> |
|
#include "gre.h" |
|
|
#ifdef MROUTING |
#ifdef MROUTING |
#include <netinet/ip_mroute.h> |
#include <netinet/ip_mroute.h> |
|
|
#define IPALLOWSRCRT 1 /* allow source-routed packets */ |
#define IPALLOWSRCRT 1 /* allow source-routed packets */ |
#endif |
#endif |
#ifndef IPMTUDISC |
#ifndef IPMTUDISC |
#define IPMTUDISC 0 |
#define IPMTUDISC 1 |
#endif |
#endif |
#ifndef IPMTUDISCTIMEOUT |
#ifndef IPMTUDISCTIMEOUT |
#define IPMTUDISCTIMEOUT (10 * 60) /* as per RFC 1191 */ |
#define IPMTUDISCTIMEOUT (10 * 60) /* as per RFC 1191 */ |
Line 200 struct rttimer_queue *ip_mtudisc_timeout |
|
Line 201 struct rttimer_queue *ip_mtudisc_timeout |
|
|
|
extern struct domain inetdomain; |
extern struct domain inetdomain; |
int ipqmaxlen = IFQ_MAXLEN; |
int ipqmaxlen = IFQ_MAXLEN; |
|
u_long in_ifaddrhash; /* size of hash table - 1 */ |
|
int in_ifaddrentries; /* total number of addrs */ |
struct in_ifaddrhead in_ifaddr; |
struct in_ifaddrhead in_ifaddr; |
struct in_ifaddrhashhead *in_ifaddrhashtbl; |
struct in_ifaddrhashhead *in_ifaddrhashtbl; |
struct ifqueue ipintrq; |
struct ifqueue ipintrq; |
|
|
int s; |
int s; |
|
|
/* |
/* |
* Use splvm() -- we're bloking things that would cause |
* Use splvm() -- we're blocking things that would cause |
* mbuf allocation. |
* mbuf allocation. |
*/ |
*/ |
s = splvm(); |
s = splvm(); |
|
|
int i; |
int i; |
|
|
pool_init(&ipqent_pool, sizeof(struct ipqent), 0, 0, 0, "ipqepl", |
pool_init(&ipqent_pool, sizeof(struct ipqent), 0, 0, 0, "ipqepl", |
0, NULL, NULL, M_IPQ); |
NULL); |
|
|
pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW); |
pr = pffindproto(PF_INET, IPPROTO_RAW, SOCK_RAW); |
if (pr == 0) |
if (pr == 0) |
|
|
in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, M_IFADDR, |
in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, M_IFADDR, |
M_WAITOK, &in_ifaddrhash); |
M_WAITOK, &in_ifaddrhash); |
if (ip_mtudisc != 0) |
if (ip_mtudisc != 0) |
ip_mtudisc_timeout_q = |
ip_mtudisc_timeout_q = |
rt_timer_queue_create(ip_mtudisc_timeout); |
rt_timer_queue_create(ip_mtudisc_timeout); |
#ifdef GATEWAY |
#ifdef GATEWAY |
ipflow_init(); |
ipflow_init(); |
Line 414 ip_input(struct mbuf *m) |
|
Line 417 ip_input(struct mbuf *m) |
|
* If no IP addresses have been set yet but the interfaces |
* If no IP addresses have been set yet but the interfaces |
* are receiving, can't do anything with incoming packets yet. |
* are receiving, can't do anything with incoming packets yet. |
*/ |
*/ |
if (in_ifaddr.tqh_first == 0) |
if (TAILQ_FIRST(&in_ifaddr) == 0) |
goto bad; |
goto bad; |
ipstat.ips_total++; |
ipstat.ips_total++; |
if (m->m_len < sizeof (struct ip) && |
/* |
(m = m_pullup(m, sizeof (struct ip))) == 0) { |
* If the IP header is not aligned, slurp it up into a new |
ipstat.ips_toosmall++; |
* mbuf with space for link headers, in the event we forward |
return; |
* it. Otherwise, if it is aligned, make sure the entire |
|
* base IP header is in the first mbuf of the chain. |
|
*/ |
|
if (IP_HDR_ALIGNED_P(mtod(m, caddr_t)) == 0) { |
|
if ((m = m_copyup(m, sizeof(struct ip), |
|
(max_linkhdr + 3) & ~3)) == NULL) { |
|
/* XXXJRT new stat, please */ |
|
ipstat.ips_toosmall++; |
|
return; |
|
} |
|
} else if (__predict_false(m->m_len < sizeof (struct ip))) { |
|
if ((m = m_pullup(m, sizeof (struct ip))) == NULL) { |
|
ipstat.ips_toosmall++; |
|
return; |
|
} |
} |
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
if (ip->ip_v != IPVERSION) { |
if (ip->ip_v != IPVERSION) { |
Line 508 ip_input(struct mbuf *m) |
|
Line 525 ip_input(struct mbuf *m) |
|
} |
} |
|
|
#ifdef IPSEC |
#ifdef IPSEC |
/* ipflow (IP fast fowarding) is not compatible with IPsec. */ |
/* ipflow (IP fast forwarding) is not compatible with IPsec. */ |
m->m_flags &= ~M_CANFASTFWD; |
m->m_flags &= ~M_CANFASTFWD; |
#else |
#else |
/* |
/* |
Line 542 ip_input(struct mbuf *m) |
|
Line 559 ip_input(struct mbuf *m) |
|
if (m == NULL) |
if (m == NULL) |
return; |
return; |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
|
hlen = ip->ip_hl << 2; |
} |
} |
#endif /* PFIL_HOOKS */ |
#endif /* PFIL_HOOKS */ |
|
|
Line 554 ip_input(struct mbuf *m) |
|
Line 572 ip_input(struct mbuf *m) |
|
#endif |
#endif |
|
|
/* |
/* |
* Convert fields to host representation. |
|
*/ |
|
NTOHS(ip->ip_len); |
|
NTOHS(ip->ip_off); |
|
|
|
/* |
|
* Process options and, if not destined for us, |
* Process options and, if not destined for us, |
* ship it on. ip_dooptions returns 1 when an |
* ship it on. ip_dooptions returns 1 when an |
* error was detected (causing an icmp message |
* error was detected (causing an icmp message |
Line 577 ip_input(struct mbuf *m) |
|
Line 589 ip_input(struct mbuf *m) |
|
* as not mine. |
* as not mine. |
*/ |
*/ |
downmatch = 0; |
downmatch = 0; |
for (ia = IN_IFADDR_HASH(ip->ip_dst.s_addr).lh_first; |
LIST_FOREACH(ia, &IN_IFADDR_HASH(ip->ip_dst.s_addr), ia_hash) { |
ia != NULL; |
|
ia = ia->ia_hash.le_next) { |
|
if (in_hosteq(ia->ia_addr.sin_addr, ip->ip_dst)) { |
if (in_hosteq(ia->ia_addr.sin_addr, ip->ip_dst)) { |
if ((ia->ia_ifp->if_flags & IFF_UP) != 0) |
if ((ia->ia_ifp->if_flags & IFF_UP) != 0) |
break; |
break; |
Line 590 ip_input(struct mbuf *m) |
|
Line 600 ip_input(struct mbuf *m) |
|
if (ia != NULL) |
if (ia != NULL) |
goto ours; |
goto ours; |
if (m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST) { |
if (m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST) { |
for (ifa = m->m_pkthdr.rcvif->if_addrlist.tqh_first; |
TAILQ_FOREACH(ifa, &m->m_pkthdr.rcvif->if_addrlist, ifa_list) { |
ifa != NULL; ifa = ifa->ifa_list.tqe_next) { |
if (ifa->ifa_addr->sa_family != AF_INET) |
if (ifa->ifa_addr->sa_family != AF_INET) continue; |
continue; |
ia = ifatoia(ifa); |
ia = ifatoia(ifa); |
if (in_hosteq(ip->ip_dst, ia->ia_broadaddr.sin_addr) || |
if (in_hosteq(ip->ip_dst, ia->ia_broadaddr.sin_addr) || |
in_hosteq(ip->ip_dst, ia->ia_netbroadcast) || |
in_hosteq(ip->ip_dst, ia->ia_netbroadcast) || |
Line 616 ip_input(struct mbuf *m) |
|
Line 626 ip_input(struct mbuf *m) |
|
#ifdef MROUTING |
#ifdef MROUTING |
extern struct socket *ip_mrouter; |
extern struct socket *ip_mrouter; |
|
|
if (m->m_flags & M_EXT) { |
if (M_READONLY(m)) { |
if ((m = m_pullup(m, hlen)) == 0) { |
if ((m = m_pullup(m, hlen)) == 0) { |
ipstat.ips_toosmall++; |
ipstat.ips_toosmall++; |
return; |
return; |
Line 687 ip_input(struct mbuf *m) |
|
Line 697 ip_input(struct mbuf *m) |
|
ipstat.ips_cantforward++; |
ipstat.ips_cantforward++; |
return; |
return; |
} |
} |
|
#ifdef IPSEC |
|
if (ipsec4_in_reject(m, NULL)) { |
|
ipsecstat.in_polvio++; |
|
goto bad; |
|
} |
|
#endif |
|
|
ip_forward(m, 0); |
ip_forward(m, 0); |
} |
} |
return; |
return; |
|
|
* if the packet was previously fragmented, |
* if the packet was previously fragmented, |
* but it's not worth the time; just let them time out.) |
* but it's not worth the time; just let them time out.) |
*/ |
*/ |
if (ip->ip_off & ~(IP_DF|IP_RF)) { |
if (ip->ip_off & ~htons(IP_DF|IP_RF)) { |
|
if (M_READONLY(m)) { |
|
if ((m = m_pullup(m, hlen)) == NULL) { |
|
ipstat.ips_toosmall++; |
|
goto bad; |
|
} |
|
ip = mtod(m, struct ip *); |
|
} |
|
|
/* |
/* |
* Look for queue of fragments |
* Look for queue of fragments |
* of this datagram. |
* of this datagram. |
*/ |
*/ |
IPQ_LOCK(); |
IPQ_LOCK(); |
for (fp = ipq.lh_first; fp != NULL; fp = fp->ipq_q.le_next) |
LIST_FOREACH(fp, &ipq, ipq_q) |
if (ip->ip_id == fp->ipq_id && |
if (ip->ip_id == fp->ipq_id && |
in_hosteq(ip->ip_src, fp->ipq_src) && |
in_hosteq(ip->ip_src, fp->ipq_src) && |
in_hosteq(ip->ip_dst, fp->ipq_dst) && |
in_hosteq(ip->ip_dst, fp->ipq_dst) && |
|
|
* set ipqe_mff if more fragments are expected, |
* set ipqe_mff if more fragments are expected, |
* convert offset of this to bytes. |
* convert offset of this to bytes. |
*/ |
*/ |
ip->ip_len -= hlen; |
ip->ip_len = htons(ntohs(ip->ip_len) - hlen); |
mff = (ip->ip_off & IP_MF) != 0; |
mff = (ip->ip_off & htons(IP_MF)) != 0; |
if (mff) { |
if (mff) { |
/* |
/* |
* Make sure that fragments have a data length |
* Make sure that fragments have a data length |
* that's a non-zero multiple of 8 bytes. |
* that's a non-zero multiple of 8 bytes. |
*/ |
*/ |
if (ip->ip_len == 0 || (ip->ip_len & 0x7) != 0) { |
if (ntohs(ip->ip_len) == 0 || |
|
(ntohs(ip->ip_len) & 0x7) != 0) { |
ipstat.ips_badfrags++; |
ipstat.ips_badfrags++; |
IPQ_UNLOCK(); |
IPQ_UNLOCK(); |
goto bad; |
goto bad; |
} |
} |
} |
} |
ip->ip_off <<= 3; |
ip->ip_off = htons((ntohs(ip->ip_off) & IP_OFFMASK) << 3); |
|
|
/* |
/* |
* If datagram marked as having more fragments |
* If datagram marked as having more fragments |
* or if this is not the first fragment, |
* or if this is not the first fragment, |
* attempt reassembly; if it succeeds, proceed. |
* attempt reassembly; if it succeeds, proceed. |
*/ |
*/ |
if (mff || ip->ip_off) { |
if (mff || ip->ip_off != htons(0)) { |
ipstat.ips_fragments++; |
ipstat.ips_fragments++; |
ipqe = pool_get(&ipqent_pool, PR_NOWAIT); |
ipqe = pool_get(&ipqent_pool, PR_NOWAIT); |
if (ipqe == NULL) { |
if (ipqe == NULL) { |
|
|
ipstat.ips_reassembled++; |
ipstat.ips_reassembled++; |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
hlen = ip->ip_hl << 2; |
hlen = ip->ip_hl << 2; |
ip->ip_len += hlen; |
ip->ip_len = htons(ntohs(ip->ip_len) + hlen); |
} else |
} else |
if (fp) |
if (fp) |
ip_freef(fp); |
ip_freef(fp); |
|
|
*/ |
*/ |
#if IFA_STATS |
#if IFA_STATS |
if (ia && ip) |
if (ia && ip) |
ia->ia_ifa.ifa_data.ifad_inbytes += ip->ip_len; |
ia->ia_ifa.ifa_data.ifad_inbytes += ntohs(ip->ip_len); |
#endif |
#endif |
ipstat.ips_delivered++; |
ipstat.ips_delivered++; |
{ |
{ |
Line 851 ip_reass(ipqe, fp) |
|
Line 877 ip_reass(ipqe, fp) |
|
fp->ipq_ttl = IPFRAGTTL; |
fp->ipq_ttl = IPFRAGTTL; |
fp->ipq_p = ipqe->ipqe_ip->ip_p; |
fp->ipq_p = ipqe->ipqe_ip->ip_p; |
fp->ipq_id = ipqe->ipqe_ip->ip_id; |
fp->ipq_id = ipqe->ipqe_ip->ip_id; |
LIST_INIT(&fp->ipq_fragq); |
TAILQ_INIT(&fp->ipq_fragq); |
fp->ipq_src = ipqe->ipqe_ip->ip_src; |
fp->ipq_src = ipqe->ipqe_ip->ip_src; |
fp->ipq_dst = ipqe->ipqe_ip->ip_dst; |
fp->ipq_dst = ipqe->ipqe_ip->ip_dst; |
p = NULL; |
p = NULL; |
Line 861 ip_reass(ipqe, fp) |
|
Line 887 ip_reass(ipqe, fp) |
|
/* |
/* |
* Find a segment which begins after this one does. |
* Find a segment which begins after this one does. |
*/ |
*/ |
for (p = NULL, q = fp->ipq_fragq.lh_first; q != NULL; |
for (p = NULL, q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL; |
p = q, q = q->ipqe_q.le_next) |
p = q, q = TAILQ_NEXT(q, ipqe_q)) |
if (q->ipqe_ip->ip_off > ipqe->ipqe_ip->ip_off) |
if (ntohs(q->ipqe_ip->ip_off) > ntohs(ipqe->ipqe_ip->ip_off)) |
break; |
break; |
|
|
/* |
/* |
Line 872 ip_reass(ipqe, fp) |
|
Line 898 ip_reass(ipqe, fp) |
|
* segment. If it provides all of our data, drop us. |
* segment. If it provides all of our data, drop us. |
*/ |
*/ |
if (p != NULL) { |
if (p != NULL) { |
i = p->ipqe_ip->ip_off + p->ipqe_ip->ip_len - |
i = ntohs(p->ipqe_ip->ip_off) + ntohs(p->ipqe_ip->ip_len) - |
ipqe->ipqe_ip->ip_off; |
ntohs(ipqe->ipqe_ip->ip_off); |
if (i > 0) { |
if (i > 0) { |
if (i >= ipqe->ipqe_ip->ip_len) |
if (i >= ntohs(ipqe->ipqe_ip->ip_len)) |
goto dropfrag; |
goto dropfrag; |
m_adj(ipqe->ipqe_m, i); |
m_adj(ipqe->ipqe_m, i); |
ipqe->ipqe_ip->ip_off += i; |
ipqe->ipqe_ip->ip_off = |
ipqe->ipqe_ip->ip_len -= i; |
htons(ntohs(ipqe->ipqe_ip->ip_off) + i); |
|
ipqe->ipqe_ip->ip_len = |
|
htons(ntohs(ipqe->ipqe_ip->ip_len) - i); |
} |
} |
} |
} |
|
|
Line 887 ip_reass(ipqe, fp) |
|
Line 915 ip_reass(ipqe, fp) |
|
* While we overlap succeeding segments trim them or, |
* While we overlap succeeding segments trim them or, |
* if they are completely covered, dequeue them. |
* if they are completely covered, dequeue them. |
*/ |
*/ |
for (; q != NULL && ipqe->ipqe_ip->ip_off + ipqe->ipqe_ip->ip_len > |
for (; q != NULL && |
q->ipqe_ip->ip_off; q = nq) { |
ntohs(ipqe->ipqe_ip->ip_off) + ntohs(ipqe->ipqe_ip->ip_len) > |
i = (ipqe->ipqe_ip->ip_off + ipqe->ipqe_ip->ip_len) - |
ntohs(q->ipqe_ip->ip_off); q = nq) { |
q->ipqe_ip->ip_off; |
i = (ntohs(ipqe->ipqe_ip->ip_off) + |
if (i < q->ipqe_ip->ip_len) { |
ntohs(ipqe->ipqe_ip->ip_len)) - ntohs(q->ipqe_ip->ip_off); |
q->ipqe_ip->ip_len -= i; |
if (i < ntohs(q->ipqe_ip->ip_len)) { |
q->ipqe_ip->ip_off += i; |
q->ipqe_ip->ip_len = |
|
htons(ntohs(q->ipqe_ip->ip_len) - i); |
|
q->ipqe_ip->ip_off = |
|
htons(ntohs(q->ipqe_ip->ip_off) + i); |
m_adj(q->ipqe_m, i); |
m_adj(q->ipqe_m, i); |
break; |
break; |
} |
} |
nq = q->ipqe_q.le_next; |
nq = TAILQ_NEXT(q, ipqe_q); |
m_freem(q->ipqe_m); |
m_freem(q->ipqe_m); |
LIST_REMOVE(q, ipqe_q); |
TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
} |
} |
|
|
|
|
* check for complete reassembly. |
* check for complete reassembly. |
*/ |
*/ |
if (p == NULL) { |
if (p == NULL) { |
LIST_INSERT_HEAD(&fp->ipq_fragq, ipqe, ipqe_q); |
TAILQ_INSERT_HEAD(&fp->ipq_fragq, ipqe, ipqe_q); |
} else { |
} else { |
LIST_INSERT_AFTER(p, ipqe, ipqe_q); |
TAILQ_INSERT_AFTER(&fp->ipq_fragq, p, ipqe, ipqe_q); |
} |
} |
next = 0; |
next = 0; |
for (p = NULL, q = fp->ipq_fragq.lh_first; q != NULL; |
for (p = NULL, q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL; |
p = q, q = q->ipqe_q.le_next) { |
p = q, q = TAILQ_NEXT(q, ipqe_q)) { |
if (q->ipqe_ip->ip_off != next) |
if (ntohs(q->ipqe_ip->ip_off) != next) |
return (0); |
return (0); |
next += q->ipqe_ip->ip_len; |
next += ntohs(q->ipqe_ip->ip_len); |
} |
} |
if (p->ipqe_mff) |
if (p->ipqe_mff) |
return (0); |
return (0); |
|
|
* Reassembly is complete. Check for a bogus message size and |
* Reassembly is complete. Check for a bogus message size and |
* concatenate fragments. |
* concatenate fragments. |
*/ |
*/ |
q = fp->ipq_fragq.lh_first; |
q = TAILQ_FIRST(&fp->ipq_fragq); |
ip = q->ipqe_ip; |
ip = q->ipqe_ip; |
if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) { |
if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) { |
ipstat.ips_toolong++; |
ipstat.ips_toolong++; |
|
|
t = m->m_next; |
t = m->m_next; |
m->m_next = 0; |
m->m_next = 0; |
m_cat(m, t); |
m_cat(m, t); |
nq = q->ipqe_q.le_next; |
nq = TAILQ_NEXT(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
for (q = nq; q != NULL; q = nq) { |
for (q = nq; q != NULL; q = nq) { |
t = q->ipqe_m; |
t = q->ipqe_m; |
nq = q->ipqe_q.le_next; |
nq = TAILQ_NEXT(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
m_cat(m, t); |
m_cat(m, t); |
} |
} |
|
|
* dequeue and discard fragment reassembly header. |
* dequeue and discard fragment reassembly header. |
* Make header visible. |
* Make header visible. |
*/ |
*/ |
ip->ip_len = next; |
ip->ip_len = htons(next); |
ip->ip_src = fp->ipq_src; |
ip->ip_src = fp->ipq_src; |
ip->ip_dst = fp->ipq_dst; |
ip->ip_dst = fp->ipq_dst; |
LIST_REMOVE(fp, ipq_q); |
LIST_REMOVE(fp, ipq_q); |
|
|
|
|
IPQ_LOCK_CHECK(); |
IPQ_LOCK_CHECK(); |
|
|
for (q = fp->ipq_fragq.lh_first; q != NULL; q = p) { |
for (q = TAILQ_FIRST(&fp->ipq_fragq); q != NULL; q = p) { |
p = q->ipqe_q.le_next; |
p = TAILQ_NEXT(q, ipqe_q); |
m_freem(q->ipqe_m); |
m_freem(q->ipqe_m); |
LIST_REMOVE(q, ipqe_q); |
TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
} |
} |
LIST_REMOVE(fp, ipq_q); |
LIST_REMOVE(fp, ipq_q); |
|
|
int s = splsoftnet(); |
int s = splsoftnet(); |
|
|
IPQ_LOCK(); |
IPQ_LOCK(); |
for (fp = ipq.lh_first; fp != NULL; fp = nfp) { |
for (fp = LIST_FIRST(&ipq); fp != NULL; fp = nfp) { |
nfp = fp->ipq_q.le_next; |
nfp = LIST_NEXT(fp, ipq_q); |
if (--fp->ipq_ttl == 0) { |
if (--fp->ipq_ttl == 0) { |
ipstat.ips_fragtimeout++; |
ipstat.ips_fragtimeout++; |
ip_freef(fp); |
ip_freef(fp); |
|
|
if (ip_maxfragpackets < 0) |
if (ip_maxfragpackets < 0) |
; |
; |
else { |
else { |
while (ip_nfragpackets > ip_maxfragpackets && ipq.lh_first) |
while (ip_nfragpackets > ip_maxfragpackets && LIST_FIRST(&ipq)) |
ip_freef(ipq.lh_first); |
ip_freef(LIST_FIRST(&ipq)); |
} |
} |
IPQ_UNLOCK(); |
IPQ_UNLOCK(); |
#ifdef GATEWAY |
#ifdef GATEWAY |
|
|
if (ipq_lock_try() == 0) |
if (ipq_lock_try() == 0) |
return; |
return; |
|
|
while (ipq.lh_first != NULL) { |
while (LIST_FIRST(&ipq) != NULL) { |
ipstat.ips_fragdropped++; |
ipstat.ips_fragdropped++; |
ip_freef(ipq.lh_first); |
ip_freef(LIST_FIRST(&ipq)); |
} |
} |
|
|
IPQ_UNLOCK(); |
IPQ_UNLOCK(); |
Line 1436 ip_stripoptions(m, mopt) |
|
Line 1467 ip_stripoptions(m, mopt) |
|
m->m_len -= olen; |
m->m_len -= olen; |
if (m->m_flags & M_PKTHDR) |
if (m->m_flags & M_PKTHDR) |
m->m_pkthdr.len -= olen; |
m->m_pkthdr.len -= olen; |
ip->ip_len -= olen; |
ip->ip_len = htons(ntohs(ip->ip_len) - olen); |
ip->ip_hl = sizeof (struct ip) >> 2; |
ip->ip_hl = sizeof (struct ip) >> 2; |
} |
} |
|
|
int inetctlerrmap[PRC_NCMDS] = { |
const int inetctlerrmap[PRC_NCMDS] = { |
0, 0, 0, 0, |
0, 0, 0, 0, |
0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, |
0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, |
EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, |
EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, |
Line 1526 ip_forward(m, srcrt) |
|
Line 1557 ip_forward(m, srcrt) |
|
* we need to generate an ICMP message to the src. |
* we need to generate an ICMP message to the src. |
* Pullup to avoid sharing mbuf cluster between m and mcopy. |
* Pullup to avoid sharing mbuf cluster between m and mcopy. |
*/ |
*/ |
mcopy = m_copym(m, 0, imin((int)ip->ip_len, 68), M_DONTWAIT); |
mcopy = m_copym(m, 0, imin(ntohs(ip->ip_len), 68), M_DONTWAIT); |
if (mcopy) |
if (mcopy) |
mcopy = m_pullup(mcopy, ip->ip_hl << 2); |
mcopy = m_pullup(mcopy, ip->ip_hl << 2); |
|
|
Line 1653 ip_forward(m, srcrt) |
|
Line 1684 ip_forward(m, srcrt) |
|
ro = &sp->req->sav->sah->sa_route; |
ro = &sp->req->sav->sah->sa_route; |
if (ro->ro_rt && ro->ro_rt->rt_ifp) { |
if (ro->ro_rt && ro->ro_rt->rt_ifp) { |
dummyifp.if_mtu = |
dummyifp.if_mtu = |
|
ro->ro_rt->rt_rmx.rmx_mtu ? |
|
ro->ro_rt->rt_rmx.rmx_mtu : |
ro->ro_rt->rt_ifp->if_mtu; |
ro->ro_rt->rt_ifp->if_mtu; |
dummyifp.if_mtu -= ipsechdr; |
dummyifp.if_mtu -= ipsechdr; |
destifp = &dummyifp; |
destifp = &dummyifp; |
Line 1667 ip_forward(m, srcrt) |
|
Line 1700 ip_forward(m, srcrt) |
|
break; |
break; |
|
|
case ENOBUFS: |
case ENOBUFS: |
|
#if 1 |
|
/* |
|
* a router should not generate ICMP_SOURCEQUENCH as |
|
* required in RFC1812 Requirements for IP Version 4 Routers. |
|
* source quench could be a big problem under DoS attacks, |
|
* or if the underlying interface is rate-limited. |
|
*/ |
|
if (mcopy) |
|
m_freem(mcopy); |
|
return; |
|
#else |
type = ICMP_SOURCEQUENCH; |
type = ICMP_SOURCEQUENCH; |
code = 0; |
code = 0; |
break; |
break; |
|
#endif |
} |
} |
icmp_error(mcopy, type, code, dest, destifp); |
icmp_error(mcopy, type, code, dest, destifp); |
} |
} |
Line 1784 ip_sysctl(name, namelen, oldp, oldlenp, |
|
Line 1829 ip_sysctl(name, namelen, oldp, oldlenp, |
|
error = sysctl_int(oldp, oldlenp, newp, newlen, |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
&ip_mtudisc); |
&ip_mtudisc); |
if (ip_mtudisc != 0 && ip_mtudisc_timeout_q == NULL) { |
if (ip_mtudisc != 0 && ip_mtudisc_timeout_q == NULL) { |
ip_mtudisc_timeout_q = |
ip_mtudisc_timeout_q = |
rt_timer_queue_create(ip_mtudisc_timeout); |
rt_timer_queue_create(ip_mtudisc_timeout); |
} else if (ip_mtudisc == 0 && ip_mtudisc_timeout_q != NULL) { |
} else if (ip_mtudisc == 0 && ip_mtudisc_timeout_q != NULL) { |
rt_timer_queue_destroy(ip_mtudisc_timeout_q, TRUE); |
rt_timer_queue_destroy(ip_mtudisc_timeout_q, TRUE); |
Line 1821 ip_sysctl(name, namelen, oldp, oldlenp, |
|
Line 1866 ip_sysctl(name, namelen, oldp, oldlenp, |
|
error = sysctl_int(oldp, oldlenp, newp, newlen, |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
&ip_mtudisc_timeout); |
&ip_mtudisc_timeout); |
if (ip_mtudisc_timeout_q != NULL) |
if (ip_mtudisc_timeout_q != NULL) |
rt_timer_queue_change(ip_mtudisc_timeout_q, |
rt_timer_queue_change(ip_mtudisc_timeout_q, |
ip_mtudisc_timeout); |
ip_mtudisc_timeout); |
return (error); |
return (error); |
#ifdef GATEWAY |
#ifdef GATEWAY |
Line 1846 ip_sysctl(name, namelen, oldp, oldlenp, |
|
Line 1891 ip_sysctl(name, namelen, oldp, oldlenp, |
|
&ip_gif_ttl)); |
&ip_gif_ttl)); |
#endif |
#endif |
|
|
|
#if NGRE > 0 |
|
case IPCTL_GRE_TTL: |
|
return(sysctl_int(oldp, oldlenp, newp, newlen, |
|
&ip_gre_ttl)); |
|
#endif |
|
|
#ifndef IPNOPRIVPORTS |
#ifndef IPNOPRIVPORTS |
case IPCTL_LOWPORTMIN: |
case IPCTL_LOWPORTMIN: |
old = lowportmin; |
old = lowportmin; |