version 1.135.2.1, 2001/08/25 06:17:02 |
version 1.135.2.2, 2002/01/10 20:02:50 |
|
|
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94 |
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94 |
*/ |
*/ |
|
|
|
#include <sys/cdefs.h> |
|
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
#include "opt_gateway.h" |
#include "opt_gateway.h" |
#include "opt_pfil_hooks.h" |
#include "opt_pfil_hooks.h" |
#include "opt_ipsec.h" |
#include "opt_ipsec.h" |
|
|
#include <sys/errno.h> |
#include <sys/errno.h> |
#include <sys/time.h> |
#include <sys/time.h> |
#include <sys/kernel.h> |
#include <sys/kernel.h> |
#include <sys/proc.h> |
|
#include <sys/pool.h> |
#include <sys/pool.h> |
|
|
#include <uvm/uvm_extern.h> |
|
|
|
#include <sys/sysctl.h> |
#include <sys/sysctl.h> |
|
|
#include <net/if.h> |
#include <net/if.h> |
Line 414 ip_input(struct mbuf *m) |
|
Line 413 ip_input(struct mbuf *m) |
|
* If no IP addresses have been set yet but the interfaces |
* If no IP addresses have been set yet but the interfaces |
* are receiving, can't do anything with incoming packets yet. |
* are receiving, can't do anything with incoming packets yet. |
*/ |
*/ |
if (in_ifaddr.tqh_first == 0) |
if (TAILQ_FIRST(&in_ifaddr) == 0) |
goto bad; |
goto bad; |
ipstat.ips_total++; |
ipstat.ips_total++; |
if (m->m_len < sizeof (struct ip) && |
if (m->m_len < sizeof (struct ip) && |
Line 459 ip_input(struct mbuf *m) |
|
Line 458 ip_input(struct mbuf *m) |
|
} |
} |
|
|
switch (m->m_pkthdr.csum_flags & |
switch (m->m_pkthdr.csum_flags & |
((m->m_pkthdr.rcvif->if_csum_flags & M_CSUM_IPv4) | |
((m->m_pkthdr.rcvif->if_csum_flags_rx & M_CSUM_IPv4) | |
M_CSUM_IPv4_BAD)) { |
M_CSUM_IPv4_BAD)) { |
case M_CSUM_IPv4|M_CSUM_IPv4_BAD: |
case M_CSUM_IPv4|M_CSUM_IPv4_BAD: |
INET_CSUM_COUNTER_INCR(&ip_hwcsum_bad); |
INET_CSUM_COUNTER_INCR(&ip_hwcsum_bad); |
Line 542 ip_input(struct mbuf *m) |
|
Line 541 ip_input(struct mbuf *m) |
|
if (m == NULL) |
if (m == NULL) |
return; |
return; |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
|
hlen = ip->ip_hl << 2; |
} |
} |
#endif /* PFIL_HOOKS */ |
#endif /* PFIL_HOOKS */ |
|
|
Line 577 ip_input(struct mbuf *m) |
|
Line 577 ip_input(struct mbuf *m) |
|
* as not mine. |
* as not mine. |
*/ |
*/ |
downmatch = 0; |
downmatch = 0; |
for (ia = IN_IFADDR_HASH(ip->ip_dst.s_addr).lh_first; |
LIST_FOREACH(ia, &IN_IFADDR_HASH(ip->ip_dst.s_addr), ia_hash) { |
ia != NULL; |
|
ia = ia->ia_hash.le_next) { |
|
if (in_hosteq(ia->ia_addr.sin_addr, ip->ip_dst)) { |
if (in_hosteq(ia->ia_addr.sin_addr, ip->ip_dst)) { |
if ((ia->ia_ifp->if_flags & IFF_UP) != 0) |
if ((ia->ia_ifp->if_flags & IFF_UP) != 0) |
break; |
break; |
Line 590 ip_input(struct mbuf *m) |
|
Line 588 ip_input(struct mbuf *m) |
|
if (ia != NULL) |
if (ia != NULL) |
goto ours; |
goto ours; |
if (m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST) { |
if (m->m_pkthdr.rcvif->if_flags & IFF_BROADCAST) { |
for (ifa = m->m_pkthdr.rcvif->if_addrlist.tqh_first; |
TAILQ_FOREACH(ifa, &m->m_pkthdr.rcvif->if_addrlist, ifa_list) { |
ifa != NULL; ifa = ifa->ifa_list.tqe_next) { |
if (ifa->ifa_addr->sa_family != AF_INET) |
if (ifa->ifa_addr->sa_family != AF_INET) continue; |
continue; |
ia = ifatoia(ifa); |
ia = ifatoia(ifa); |
if (in_hosteq(ip->ip_dst, ia->ia_broadaddr.sin_addr) || |
if (in_hosteq(ip->ip_dst, ia->ia_broadaddr.sin_addr) || |
in_hosteq(ip->ip_dst, ia->ia_netbroadcast) || |
in_hosteq(ip->ip_dst, ia->ia_netbroadcast) || |
|
|
* of this datagram. |
* of this datagram. |
*/ |
*/ |
IPQ_LOCK(); |
IPQ_LOCK(); |
for (fp = ipq.lh_first; fp != NULL; fp = fp->ipq_q.le_next) |
LIST_FOREACH(fp, &ipq, ipq_q) |
if (ip->ip_id == fp->ipq_id && |
if (ip->ip_id == fp->ipq_id && |
in_hosteq(ip->ip_src, fp->ipq_src) && |
in_hosteq(ip->ip_src, fp->ipq_src) && |
in_hosteq(ip->ip_dst, fp->ipq_dst) && |
in_hosteq(ip->ip_dst, fp->ipq_dst) && |
Line 861 ip_reass(ipqe, fp) |
|
Line 859 ip_reass(ipqe, fp) |
|
/* |
/* |
* Find a segment which begins after this one does. |
* Find a segment which begins after this one does. |
*/ |
*/ |
for (p = NULL, q = fp->ipq_fragq.lh_first; q != NULL; |
for (p = NULL, q = LIST_FIRST(&fp->ipq_fragq); q != NULL; |
p = q, q = q->ipqe_q.le_next) |
p = q, q = LIST_NEXT(q, ipqe_q)) |
if (q->ipqe_ip->ip_off > ipqe->ipqe_ip->ip_off) |
if (q->ipqe_ip->ip_off > ipqe->ipqe_ip->ip_off) |
break; |
break; |
|
|
Line 897 ip_reass(ipqe, fp) |
|
Line 895 ip_reass(ipqe, fp) |
|
m_adj(q->ipqe_m, i); |
m_adj(q->ipqe_m, i); |
break; |
break; |
} |
} |
nq = q->ipqe_q.le_next; |
nq = LIST_NEXT(q, ipqe_q); |
m_freem(q->ipqe_m); |
m_freem(q->ipqe_m); |
LIST_REMOVE(q, ipqe_q); |
LIST_REMOVE(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
|
|
LIST_INSERT_AFTER(p, ipqe, ipqe_q); |
LIST_INSERT_AFTER(p, ipqe, ipqe_q); |
} |
} |
next = 0; |
next = 0; |
for (p = NULL, q = fp->ipq_fragq.lh_first; q != NULL; |
for (p = NULL, q = LIST_FIRST(&fp->ipq_fragq); q != NULL; |
p = q, q = q->ipqe_q.le_next) { |
p = q, q = LIST_NEXT(q, ipqe_q)) { |
if (q->ipqe_ip->ip_off != next) |
if (q->ipqe_ip->ip_off != next) |
return (0); |
return (0); |
next += q->ipqe_ip->ip_len; |
next += q->ipqe_ip->ip_len; |
|
|
* Reassembly is complete. Check for a bogus message size and |
* Reassembly is complete. Check for a bogus message size and |
* concatenate fragments. |
* concatenate fragments. |
*/ |
*/ |
q = fp->ipq_fragq.lh_first; |
q = LIST_FIRST(&fp->ipq_fragq); |
ip = q->ipqe_ip; |
ip = q->ipqe_ip; |
if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) { |
if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) { |
ipstat.ips_toolong++; |
ipstat.ips_toolong++; |
|
|
t = m->m_next; |
t = m->m_next; |
m->m_next = 0; |
m->m_next = 0; |
m_cat(m, t); |
m_cat(m, t); |
nq = q->ipqe_q.le_next; |
nq = LIST_NEXT(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
for (q = nq; q != NULL; q = nq) { |
for (q = nq; q != NULL; q = nq) { |
t = q->ipqe_m; |
t = q->ipqe_m; |
nq = q->ipqe_q.le_next; |
nq = LIST_NEXT(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
m_cat(m, t); |
m_cat(m, t); |
} |
} |
|
|
|
|
IPQ_LOCK_CHECK(); |
IPQ_LOCK_CHECK(); |
|
|
for (q = fp->ipq_fragq.lh_first; q != NULL; q = p) { |
for (q = LIST_FIRST(&fp->ipq_fragq); q != NULL; q = p) { |
p = q->ipqe_q.le_next; |
p = LIST_NEXT(q, ipqe_q); |
m_freem(q->ipqe_m); |
m_freem(q->ipqe_m); |
LIST_REMOVE(q, ipqe_q); |
LIST_REMOVE(q, ipqe_q); |
pool_put(&ipqent_pool, q); |
pool_put(&ipqent_pool, q); |
|
|
int s = splsoftnet(); |
int s = splsoftnet(); |
|
|
IPQ_LOCK(); |
IPQ_LOCK(); |
for (fp = ipq.lh_first; fp != NULL; fp = nfp) { |
for (fp = LIST_FIRST(&ipq); fp != NULL; fp = nfp) { |
nfp = fp->ipq_q.le_next; |
nfp = LIST_NEXT(fp, ipq_q); |
if (--fp->ipq_ttl == 0) { |
if (--fp->ipq_ttl == 0) { |
ipstat.ips_fragtimeout++; |
ipstat.ips_fragtimeout++; |
ip_freef(fp); |
ip_freef(fp); |
|
|
if (ip_maxfragpackets < 0) |
if (ip_maxfragpackets < 0) |
; |
; |
else { |
else { |
while (ip_nfragpackets > ip_maxfragpackets && ipq.lh_first) |
while (ip_nfragpackets > ip_maxfragpackets && LIST_FIRST(&ipq)) |
ip_freef(ipq.lh_first); |
ip_freef(LIST_FIRST(&ipq)); |
} |
} |
IPQ_UNLOCK(); |
IPQ_UNLOCK(); |
#ifdef GATEWAY |
#ifdef GATEWAY |
|
|
if (ipq_lock_try() == 0) |
if (ipq_lock_try() == 0) |
return; |
return; |
|
|
while (ipq.lh_first != NULL) { |
while (LIST_FIRST(&ipq) != NULL) { |
ipstat.ips_fragdropped++; |
ipstat.ips_fragdropped++; |
ip_freef(ipq.lh_first); |
ip_freef(LIST_FIRST(&ipq)); |
} |
} |
|
|
IPQ_UNLOCK(); |
IPQ_UNLOCK(); |
Line 1440 ip_stripoptions(m, mopt) |
|
Line 1438 ip_stripoptions(m, mopt) |
|
ip->ip_hl = sizeof (struct ip) >> 2; |
ip->ip_hl = sizeof (struct ip) >> 2; |
} |
} |
|
|
int inetctlerrmap[PRC_NCMDS] = { |
const int inetctlerrmap[PRC_NCMDS] = { |
0, 0, 0, 0, |
0, 0, 0, 0, |
0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, |
0, EMSGSIZE, EHOSTDOWN, EHOSTUNREACH, |
EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, |
EHOSTUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED, |