[BACK]Return to ip_icmp.c CVS log [TXT][DIR] Up to [local] / sys / netinet

Annotation of sys/netinet/ip_icmp.c, Revision 1.1.1.1

1.1       nbrk        1: /*     $OpenBSD: ip_icmp.c,v 1.76 2007/06/11 11:29:35 henning Exp $    */
                      2: /*     $NetBSD: ip_icmp.c,v 1.19 1996/02/13 23:42:22 christos Exp $    */
                      3:
                      4: /*
                      5:  * Copyright (c) 1982, 1986, 1988, 1993
                      6:  *     The Regents of the University of California.  All rights reserved.
                      7:  *
                      8:  * Redistribution and use in source and binary forms, with or without
                      9:  * modification, are permitted provided that the following conditions
                     10:  * are met:
                     11:  * 1. Redistributions of source code must retain the above copyright
                     12:  *    notice, this list of conditions and the following disclaimer.
                     13:  * 2. Redistributions in binary form must reproduce the above copyright
                     14:  *    notice, this list of conditions and the following disclaimer in the
                     15:  *    documentation and/or other materials provided with the distribution.
                     16:  * 3. Neither the name of the University nor the names of its contributors
                     17:  *    may be used to endorse or promote products derived from this software
                     18:  *    without specific prior written permission.
                     19:  *
                     20:  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
                     21:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     22:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     23:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
                     24:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     25:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     26:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     27:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     28:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     29:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     30:  * SUCH DAMAGE.
                     31:  *
                     32:  *     @(#)COPYRIGHT   1.1 (NRL) 17 January 1995
                     33:  *
                     34:  * NRL grants permission for redistribution and use in source and binary
                     35:  * forms, with or without modification, of the software and documentation
                     36:  * created at NRL provided that the following conditions are met:
                     37:  *
                     38:  * 1. Redistributions of source code must retain the above copyright
                     39:  *    notice, this list of conditions and the following disclaimer.
                     40:  * 2. Redistributions in binary form must reproduce the above copyright
                     41:  *    notice, this list of conditions and the following disclaimer in the
                     42:  *    documentation and/or other materials provided with the distribution.
                     43:  * 3. All advertising materials mentioning features or use of this software
                     44:  *    must display the following acknowledgements:
                     45:  *     This product includes software developed by the University of
                     46:  *     California, Berkeley and its contributors.
                     47:  *     This product includes software developed at the Information
                     48:  *     Technology Division, US Naval Research Laboratory.
                     49:  * 4. Neither the name of the NRL nor the names of its contributors
                     50:  *    may be used to endorse or promote products derived from this software
                     51:  *    without specific prior written permission.
                     52:  *
                     53:  * THE SOFTWARE PROVIDED BY NRL IS PROVIDED BY NRL AND CONTRIBUTORS ``AS
                     54:  * IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
                     55:  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
                     56:  * PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL NRL OR
                     57:  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
                     58:  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
                     59:  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
                     60:  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
                     61:  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
                     62:  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
                     63:  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
                     64:  *
                     65:  * The views and conclusions contained in the software and documentation
                     66:  * are those of the authors and should not be interpreted as representing
                     67:  * official policies, either expressed or implied, of the US Naval
                     68:  * Research Laboratory (NRL).
                     69:  */
                     70:
                     71: #include "carp.h"
                     72:
                     73: #include <sys/param.h>
                     74: #include <sys/systm.h>
                     75: #include <sys/mbuf.h>
                     76: #include <sys/protosw.h>
                     77: #include <sys/socket.h>
                     78: #include <sys/sysctl.h>
                     79:
                     80: #include <net/if.h>
                     81: #include <net/route.h>
                     82:
                     83: #include <netinet/in.h>
                     84: #include <netinet/in_systm.h>
                     85: #include <netinet/in_var.h>
                     86: #include <netinet/ip.h>
                     87: #include <netinet/ip_icmp.h>
                     88: #include <netinet/ip_var.h>
                     89: #include <netinet/icmp_var.h>
                     90:
                     91: #if NCARP > 0
                     92: #include <net/if_types.h>
                     93: #include <netinet/ip_carp.h>
                     94: #endif
                     95:
                     96: /*
                     97:  * ICMP routines: error generation, receive packet processing, and
                     98:  * routines to turnaround packets back to the originator, and
                     99:  * host table maintenance routines.
                    100:  */
                    101:
                    102: int    icmpmaskrepl = 0;
                    103: int    icmpbmcastecho = 0;
                    104: int    icmptstamprepl = 1;
                    105: #ifdef ICMPPRINTFS
                    106: int    icmpprintfs = 0;
                    107: #endif
                    108: int    icmperrppslim = 100;
                    109: int    icmperrpps_count = 0;
                    110: struct timeval icmperrppslim_last;
                    111: int    icmp_rediraccept = 1;
                    112: int    icmp_redirtimeout = 10 * 60;
                    113: static struct rttimer_queue *icmp_redirect_timeout_q = NULL;
                    114: struct icmpstat icmpstat;
                    115:
                    116: int *icmpctl_vars[ICMPCTL_MAXID] = ICMPCTL_VARS;
                    117:
                    118: void icmp_mtudisc_timeout(struct rtentry *, struct rttimer *);
                    119: int icmp_ratelimit(const struct in_addr *, const int, const int);
                    120: void icmp_redirect_timeout(struct rtentry *, struct rttimer *);
                    121:
                    122: extern struct protosw inetsw[];
                    123:
                    124: void
                    125: icmp_init(void)
                    126: {
                    127:        /*
                    128:         * This is only useful if the user initializes redirtimeout to
                    129:         * something other than zero.
                    130:         */
                    131:        if (icmp_redirtimeout != 0) {
                    132:                icmp_redirect_timeout_q =
                    133:                    rt_timer_queue_create(icmp_redirtimeout);
                    134:        }
                    135: }
                    136:
                    137: struct mbuf *
                    138: icmp_do_error(struct mbuf *n, int type, int code, n_long dest, int destmtu)
                    139: {
                    140:        struct ip *oip = mtod(n, struct ip *), *nip;
                    141:        unsigned oiplen = oip->ip_hl << 2;
                    142:        struct icmp *icp;
                    143:        struct mbuf *m;
                    144:        unsigned icmplen, mblen;
                    145:
                    146: #ifdef ICMPPRINTFS
                    147:        if (icmpprintfs)
                    148:                printf("icmp_error(%x, %d, %d)\n", oip, type, code);
                    149: #endif
                    150:        if (type != ICMP_REDIRECT)
                    151:                icmpstat.icps_error++;
                    152:        /*
                    153:         * Don't send error if not the first fragment of message.
                    154:         * Don't error if the old packet protocol was ICMP
                    155:         * error message, only known informational types.
                    156:         */
                    157:        if (oip->ip_off & htons(IP_OFFMASK))
                    158:                goto freeit;
                    159:        if (oip->ip_p == IPPROTO_ICMP && type != ICMP_REDIRECT &&
                    160:            n->m_len >= oiplen + ICMP_MINLEN &&
                    161:            !ICMP_INFOTYPE(((struct icmp *)
                    162:            ((caddr_t)oip + oiplen))->icmp_type)) {
                    163:                icmpstat.icps_oldicmp++;
                    164:                goto freeit;
                    165:        }
                    166:        /* Don't send error in response to a multicast or broadcast packet */
                    167:        if (n->m_flags & (M_BCAST|M_MCAST))
                    168:                goto freeit;
                    169:
                    170:        /*
                    171:         * First, do a rate limitation check.
                    172:         */
                    173:        if (icmp_ratelimit(&oip->ip_src, type, code))
                    174:                goto freeit;    /* XXX stat */
                    175:
                    176:        /*
                    177:         * Now, formulate icmp message
                    178:         */
                    179:        icmplen = oiplen + min(8, ntohs(oip->ip_len));
                    180:        /*
                    181:         * Defend against mbuf chains shorter than oip->ip_len:
                    182:         */
                    183:        mblen = 0;
                    184:        for (m = n; m && (mblen < icmplen); m = m->m_next)
                    185:                mblen += m->m_len;
                    186:        icmplen = min(mblen, icmplen);
                    187:
                    188:        /*
                    189:         * As we are not required to return everything we have,
                    190:         * we return whatever we can return at ease.
                    191:         *
                    192:         * Note that ICMP datagrams longer than 576 octets are out of spec
                    193:         * according to RFC1812;
                    194:         */
                    195:
                    196:        KASSERT(ICMP_MINLEN <= MCLBYTES);
                    197:
                    198:        if (icmplen + ICMP_MINLEN > MCLBYTES)
                    199:                icmplen = MCLBYTES - ICMP_MINLEN - sizeof (struct ip);
                    200:
                    201:        m = m_gethdr(M_DONTWAIT, MT_HEADER);
                    202:        if (m && (sizeof (struct ip) + icmplen + ICMP_MINLEN > MHLEN)) {
                    203:                MCLGET(m, M_DONTWAIT);
                    204:                if ((m->m_flags & M_EXT) == 0) {
                    205:                        m_freem(m);
                    206:                        m = NULL;
                    207:                }
                    208:        }
                    209:        if (m == NULL)
                    210:                goto freeit;
                    211:        m->m_len = icmplen + ICMP_MINLEN;
                    212:        if ((m->m_flags & M_EXT) == 0)
                    213:                MH_ALIGN(m, m->m_len);
                    214:        icp = mtod(m, struct icmp *);
                    215:        if ((u_int)type > ICMP_MAXTYPE)
                    216:                panic("icmp_error");
                    217:        icmpstat.icps_outhist[type]++;
                    218:        icp->icmp_type = type;
                    219:        if (type == ICMP_REDIRECT)
                    220:                icp->icmp_gwaddr.s_addr = dest;
                    221:        else {
                    222:                icp->icmp_void = 0;
                    223:                /*
                    224:                 * The following assignments assume an overlay with the
                    225:                 * zeroed icmp_void field.
                    226:                 */
                    227:                if (type == ICMP_PARAMPROB) {
                    228:                        icp->icmp_pptr = code;
                    229:                        code = 0;
                    230:                } else if (type == ICMP_UNREACH &&
                    231:                    code == ICMP_UNREACH_NEEDFRAG && destmtu)
                    232:                        icp->icmp_nextmtu = htons(destmtu);
                    233:        }
                    234:
                    235:        icp->icmp_code = code;
                    236:        m_copydata(n, 0, icmplen, (caddr_t)&icp->icmp_ip);
                    237:
                    238:        /*
                    239:         * Now, copy old ip header (without options)
                    240:         * in front of icmp message.
                    241:         */
                    242:        if ((m->m_flags & M_EXT) == 0 &&
                    243:            m->m_data - sizeof(struct ip) < m->m_pktdat)
                    244:                panic("icmp len");
                    245:        m->m_data -= sizeof(struct ip);
                    246:        m->m_len += sizeof(struct ip);
                    247:        m->m_pkthdr.len = m->m_len;
                    248:        m->m_pkthdr.rcvif = n->m_pkthdr.rcvif;
                    249:        nip = mtod(m, struct ip *);
                    250:        /* ip_v set in ip_output */
                    251:        nip->ip_hl = sizeof(struct ip) >> 2;
                    252:        nip->ip_tos = 0;
                    253:        nip->ip_len = htons(m->m_len);
                    254:        /* ip_id set in ip_output */
                    255:        nip->ip_off = 0;
                    256:        /* ip_ttl set in icmp_reflect */
                    257:        nip->ip_p = IPPROTO_ICMP;
                    258:        nip->ip_src = oip->ip_src;
                    259:        nip->ip_dst = oip->ip_dst;
                    260:
                    261:        /* move PF_GENERATED to new packet, if existant XXX preserve more? */
                    262:        if (n->m_pkthdr.pf.flags & PF_TAG_GENERATED)
                    263:                m->m_pkthdr.pf.flags |= PF_TAG_GENERATED;
                    264:
                    265:        m_freem(n);
                    266:        return (m);
                    267:
                    268: freeit:
                    269:        m_freem(n);
                    270:        return (NULL);
                    271: }
                    272:
                    273: /*
                    274:  * Generate an error packet of type error
                    275:  * in response to bad packet ip.
                    276:  *
                    277:  * The ip packet inside has ip_off and ip_len in host byte order.
                    278:  */
                    279: void
                    280: icmp_error(struct mbuf *n, int type, int code, n_long dest, int destmtu)
                    281: {
                    282:        struct mbuf *m;
                    283:
                    284:        m = icmp_do_error(n, type, code, dest, destmtu);
                    285:        if (m != NULL)
                    286:                icmp_reflect(m);
                    287: }
                    288:
                    289: struct sockaddr_in icmpsrc = { sizeof (struct sockaddr_in), AF_INET };
                    290: static struct sockaddr_in icmpdst = { sizeof (struct sockaddr_in), AF_INET };
                    291: static struct sockaddr_in icmpgw = { sizeof (struct sockaddr_in), AF_INET };
                    292:
                    293: /*
                    294:  * Process a received ICMP message.
                    295:  */
                    296: void
                    297: icmp_input(struct mbuf *m, ...)
                    298: {
                    299:        struct icmp *icp;
                    300:        struct ip *ip = mtod(m, struct ip *);
                    301:        int icmplen;
                    302:        int i;
                    303:        struct in_ifaddr *ia;
                    304:        void *(*ctlfunc)(int, struct sockaddr *, void *);
                    305:        int code;
                    306:        extern u_char ip_protox[];
                    307:        int hlen;
                    308:        va_list ap;
                    309:        struct rtentry *rt;
                    310:
                    311:        va_start(ap, m);
                    312:        hlen = va_arg(ap, int);
                    313:        va_end(ap);
                    314:
                    315:        /*
                    316:         * Locate icmp structure in mbuf, and check
                    317:         * that not corrupted and of at least minimum length.
                    318:         */
                    319:        icmplen = ntohs(ip->ip_len) - hlen;
                    320: #ifdef ICMPPRINTFS
                    321:        if (icmpprintfs) {
                    322:                char buf[4 * sizeof("123")];
                    323:
                    324:                strlcpy(buf, inet_ntoa(ip->ip_dst), sizeof buf);
                    325:                printf("icmp_input from %s to %s, len %d\n",
                    326:                    inet_ntoa(ip->ip_src), buf, icmplen);
                    327:        }
                    328: #endif
                    329:        if (icmplen < ICMP_MINLEN) {
                    330:                icmpstat.icps_tooshort++;
                    331:                goto freeit;
                    332:        }
                    333:        i = hlen + min(icmplen, ICMP_ADVLENMIN);
                    334:        if (m->m_len < i && (m = m_pullup(m, i)) == NULL) {
                    335:                icmpstat.icps_tooshort++;
                    336:                return;
                    337:        }
                    338:        ip = mtod(m, struct ip *);
                    339:        m->m_len -= hlen;
                    340:        m->m_data += hlen;
                    341:        icp = mtod(m, struct icmp *);
                    342:        if (in_cksum(m, icmplen)) {
                    343:                icmpstat.icps_checksum++;
                    344:                goto freeit;
                    345:        }
                    346:        m->m_len += hlen;
                    347:        m->m_data -= hlen;
                    348:
                    349: #ifdef ICMPPRINTFS
                    350:        /*
                    351:         * Message type specific processing.
                    352:         */
                    353:        if (icmpprintfs)
                    354:                printf("icmp_input, type %d code %d\n", icp->icmp_type,
                    355:                    icp->icmp_code);
                    356: #endif
                    357:        if (icp->icmp_type > ICMP_MAXTYPE)
                    358:                goto raw;
                    359:        icmpstat.icps_inhist[icp->icmp_type]++;
                    360:        code = icp->icmp_code;
                    361:        switch (icp->icmp_type) {
                    362:
                    363:        case ICMP_UNREACH:
                    364:                switch (code) {
                    365:                case ICMP_UNREACH_NET:
                    366:                case ICMP_UNREACH_HOST:
                    367:                case ICMP_UNREACH_PROTOCOL:
                    368:                case ICMP_UNREACH_PORT:
                    369:                case ICMP_UNREACH_SRCFAIL:
                    370:                        code += PRC_UNREACH_NET;
                    371:                        break;
                    372:
                    373:                case ICMP_UNREACH_NEEDFRAG:
                    374:                        code = PRC_MSGSIZE;
                    375:                        break;
                    376:
                    377:                case ICMP_UNREACH_NET_UNKNOWN:
                    378:                case ICMP_UNREACH_NET_PROHIB:
                    379:                case ICMP_UNREACH_TOSNET:
                    380:                        code = PRC_UNREACH_NET;
                    381:                        break;
                    382:
                    383:                case ICMP_UNREACH_HOST_UNKNOWN:
                    384:                case ICMP_UNREACH_ISOLATED:
                    385:                case ICMP_UNREACH_HOST_PROHIB:
                    386:                case ICMP_UNREACH_TOSHOST:
                    387:                case ICMP_UNREACH_FILTER_PROHIB:
                    388:                case ICMP_UNREACH_HOST_PRECEDENCE:
                    389:                case ICMP_UNREACH_PRECEDENCE_CUTOFF:
                    390:                        code = PRC_UNREACH_HOST;
                    391:                        break;
                    392:
                    393:                default:
                    394:                        goto badcode;
                    395:                }
                    396:                goto deliver;
                    397:
                    398:        case ICMP_TIMXCEED:
                    399:                if (code > 1)
                    400:                        goto badcode;
                    401:                code += PRC_TIMXCEED_INTRANS;
                    402:                goto deliver;
                    403:
                    404:        case ICMP_PARAMPROB:
                    405:                if (code > 1)
                    406:                        goto badcode;
                    407:                code = PRC_PARAMPROB;
                    408:                goto deliver;
                    409:
                    410:        case ICMP_SOURCEQUENCH:
                    411:                if (code)
                    412:                        goto badcode;
                    413:                code = PRC_QUENCH;
                    414:        deliver:
                    415:                /* Free packet atttributes */
                    416:                if (m->m_flags & M_PKTHDR)
                    417:                        m_tag_delete_chain(m);
                    418:
                    419:                /*
                    420:                 * Problem with datagram; advise higher level routines.
                    421:                 */
                    422:                if (icmplen < ICMP_ADVLENMIN || icmplen < ICMP_ADVLEN(icp) ||
                    423:                    icp->icmp_ip.ip_hl < (sizeof(struct ip) >> 2)) {
                    424:                        icmpstat.icps_badlen++;
                    425:                        goto freeit;
                    426:                }
                    427:                if (IN_MULTICAST(icp->icmp_ip.ip_dst.s_addr))
                    428:                        goto badcode;
                    429: #ifdef INET6
                    430:                /* Get more contiguous data for a v6 in v4 ICMP message. */
                    431:                if (icp->icmp_ip.ip_p == IPPROTO_IPV6) {
                    432:                        if (icmplen < ICMP_V6ADVLENMIN ||
                    433:                            icmplen < ICMP_V6ADVLEN(icp)) {
                    434:                                icmpstat.icps_badlen++;
                    435:                                goto freeit;
                    436:                        } else {
                    437:                                if ((m = m_pullup(m, (ip->ip_hl << 2) +
                    438:                                    ICMP_V6ADVLEN(icp))) == NULL) {
                    439:                                        icmpstat.icps_tooshort++;
                    440:                                        return;
                    441:                                }
                    442:                                ip = mtod(m, struct ip *);
                    443:                                icp = (struct icmp *)
                    444:                                    (m->m_data + (ip->ip_hl << 2));
                    445:                        }
                    446:                }
                    447: #endif /* INET6 */
                    448: #ifdef ICMPPRINTFS
                    449:                if (icmpprintfs)
                    450:                        printf("deliver to protocol %d\n", icp->icmp_ip.ip_p);
                    451: #endif
                    452:                icmpsrc.sin_addr = icp->icmp_ip.ip_dst;
                    453: #if NCARP > 0
                    454:                if (m->m_pkthdr.rcvif->if_type == IFT_CARP &&
                    455:                    m->m_pkthdr.rcvif->if_flags & IFF_LINK0 &&
                    456:                    carp_lsdrop(m, AF_INET, &icmpsrc.sin_addr.s_addr,
                    457:                    &ip->ip_dst.s_addr))
                    458:                        goto freeit;
                    459: #endif
                    460:                /*
                    461:                 * XXX if the packet contains [IPv4 AH TCP], we can't make a
                    462:                 * notification to TCP layer.
                    463:                 */
                    464:                ctlfunc = inetsw[ip_protox[icp->icmp_ip.ip_p]].pr_ctlinput;
                    465:                if (ctlfunc)
                    466:                        (*ctlfunc)(code, sintosa(&icmpsrc), &icp->icmp_ip);
                    467:                break;
                    468:
                    469:        badcode:
                    470:                icmpstat.icps_badcode++;
                    471:                break;
                    472:
                    473:        case ICMP_ECHO:
                    474:                if (!icmpbmcastecho &&
                    475:                    (m->m_flags & (M_MCAST | M_BCAST)) != 0) {
                    476:                        icmpstat.icps_bmcastecho++;
                    477:                        break;
                    478:                }
                    479:                icp->icmp_type = ICMP_ECHOREPLY;
                    480:                goto reflect;
                    481:
                    482:        case ICMP_TSTAMP:
                    483:                if (icmptstamprepl == 0)
                    484:                        break;
                    485:
                    486:                if (!icmpbmcastecho &&
                    487:                    (m->m_flags & (M_MCAST | M_BCAST)) != 0) {
                    488:                        icmpstat.icps_bmcastecho++;
                    489:                        break;
                    490:                }
                    491:                if (icmplen < ICMP_TSLEN) {
                    492:                        icmpstat.icps_badlen++;
                    493:                        break;
                    494:                }
                    495:                icp->icmp_type = ICMP_TSTAMPREPLY;
                    496:                icp->icmp_rtime = iptime();
                    497:                icp->icmp_ttime = icp->icmp_rtime;      /* bogus, do later! */
                    498:                goto reflect;
                    499:
                    500:        case ICMP_MASKREQ:
                    501:                if (icmpmaskrepl == 0)
                    502:                        break;
                    503:                /*
                    504:                 * We are not able to respond with all ones broadcast
                    505:                 * unless we receive it over a point-to-point interface.
                    506:                 */
                    507:                if (icmplen < ICMP_MASKLEN) {
                    508:                        icmpstat.icps_badlen++;
                    509:                        break;
                    510:                }
                    511:                if (ip->ip_dst.s_addr == INADDR_BROADCAST ||
                    512:                    ip->ip_dst.s_addr == INADDR_ANY)
                    513:                        icmpdst.sin_addr = ip->ip_src;
                    514:                else
                    515:                        icmpdst.sin_addr = ip->ip_dst;
                    516:                if (m->m_pkthdr.rcvif == NULL)
                    517:                        break;
                    518:                ia = ifatoia(ifaof_ifpforaddr(sintosa(&icmpdst),
                    519:                    m->m_pkthdr.rcvif));
                    520:                if (ia == 0)
                    521:                        break;
                    522:                icp->icmp_type = ICMP_MASKREPLY;
                    523:                icp->icmp_mask = ia->ia_sockmask.sin_addr.s_addr;
                    524:                if (ip->ip_src.s_addr == 0) {
                    525:                        if (ia->ia_ifp->if_flags & IFF_BROADCAST)
                    526:                                ip->ip_src = ia->ia_broadaddr.sin_addr;
                    527:                        else if (ia->ia_ifp->if_flags & IFF_POINTOPOINT)
                    528:                                ip->ip_src = ia->ia_dstaddr.sin_addr;
                    529:                }
                    530: reflect:
                    531: #if NCARP > 0
                    532:                if (m->m_pkthdr.rcvif->if_type == IFT_CARP &&
                    533:                    m->m_pkthdr.rcvif->if_flags & IFF_LINK0 &&
                    534:                    carp_lsdrop(m, AF_INET, &ip->ip_src.s_addr,
                    535:                    &ip->ip_dst.s_addr))
                    536:                        goto freeit;
                    537: #endif
                    538:                /* Free packet atttributes */
                    539:                if (m->m_flags & M_PKTHDR)
                    540:                        m_tag_delete_chain(m);
                    541:
                    542:                icmpstat.icps_reflect++;
                    543:                icmpstat.icps_outhist[icp->icmp_type]++;
                    544:                icmp_reflect(m);
                    545:                return;
                    546:
                    547:        case ICMP_REDIRECT:
                    548:                /* Free packet atttributes */
                    549:                if (m->m_flags & M_PKTHDR)
                    550:                        m_tag_delete_chain(m);
                    551:                if (icmp_rediraccept == 0)
                    552:                        goto freeit;
                    553:                if (code > 3)
                    554:                        goto badcode;
                    555:                if (icmplen < ICMP_ADVLENMIN || icmplen < ICMP_ADVLEN(icp) ||
                    556:                    icp->icmp_ip.ip_hl < (sizeof(struct ip) >> 2)) {
                    557:                        icmpstat.icps_badlen++;
                    558:                        break;
                    559:                }
                    560:                /*
                    561:                 * Short circuit routing redirects to force
                    562:                 * immediate change in the kernel's routing
                    563:                 * tables.  The message is also handed to anyone
                    564:                 * listening on a raw socket (e.g. the routing
                    565:                 * daemon for use in updating its tables).
                    566:                 */
                    567:                icmpgw.sin_addr = ip->ip_src;
                    568:                icmpdst.sin_addr = icp->icmp_gwaddr;
                    569: #ifdef ICMPPRINTFS
                    570:                if (icmpprintfs) {
                    571:                        char buf[4 * sizeof("123")];
                    572:                        strlcpy(buf, inet_ntoa(icp->icmp_ip.ip_dst),
                    573:                            sizeof buf);
                    574:
                    575:                        printf("redirect dst %s to %s\n",
                    576:                            buf, inet_ntoa(icp->icmp_gwaddr));
                    577:                }
                    578: #endif
                    579:                icmpsrc.sin_addr = icp->icmp_ip.ip_dst;
                    580: #if NCARP > 0
                    581:                if (m->m_pkthdr.rcvif->if_type == IFT_CARP &&
                    582:                    m->m_pkthdr.rcvif->if_flags & IFF_LINK0 &&
                    583:                    carp_lsdrop(m, AF_INET, &icmpsrc.sin_addr.s_addr,
                    584:                    &ip->ip_dst.s_addr))
                    585:                        goto freeit;
                    586: #endif
                    587:                rt = NULL;
                    588:                rtredirect(sintosa(&icmpsrc), sintosa(&icmpdst),
                    589:                    (struct sockaddr *)0, RTF_GATEWAY | RTF_HOST,
                    590:                    sintosa(&icmpgw), (struct rtentry **)&rt);
                    591:                if (rt != NULL && icmp_redirtimeout != 0) {
                    592:                        (void)rt_timer_add(rt, icmp_redirect_timeout,
                    593:                            icmp_redirect_timeout_q);
                    594:                }
                    595:                if (rt != NULL)
                    596:                        rtfree(rt);
                    597:                pfctlinput(PRC_REDIRECT_HOST, sintosa(&icmpsrc));
                    598:                break;
                    599:
                    600:        /*
                    601:         * No kernel processing for the following;
                    602:         * just fall through to send to raw listener.
                    603:         */
                    604:        case ICMP_ECHOREPLY:
                    605:        case ICMP_ROUTERADVERT:
                    606:        case ICMP_ROUTERSOLICIT:
                    607:        case ICMP_TSTAMPREPLY:
                    608:        case ICMP_IREQREPLY:
                    609:        case ICMP_MASKREPLY:
                    610:        case ICMP_TRACEROUTE:
                    611:        case ICMP_DATACONVERR:
                    612:        case ICMP_MOBILE_REDIRECT:
                    613:        case ICMP_IPV6_WHEREAREYOU:
                    614:        case ICMP_IPV6_IAMHERE:
                    615:        case ICMP_MOBILE_REGREQUEST:
                    616:        case ICMP_MOBILE_REGREPLY:
                    617:        case ICMP_PHOTURIS:
                    618:        default:
                    619:                break;
                    620:        }
                    621:
                    622: raw:
                    623:        rip_input(m);
                    624:        return;
                    625:
                    626: freeit:
                    627:        m_freem(m);
                    628: }
                    629:
                    630: /*
                    631:  * Reflect the ip packet back to the source
                    632:  */
                    633: void
                    634: icmp_reflect(struct mbuf *m)
                    635: {
                    636:        struct ip *ip = mtod(m, struct ip *);
                    637:        struct in_ifaddr *ia;
                    638:        struct in_addr t;
                    639:        struct mbuf *opts = 0;
                    640:        int optlen = (ip->ip_hl << 2) - sizeof(struct ip);
                    641:
                    642:        if (!in_canforward(ip->ip_src) &&
                    643:            ((ip->ip_src.s_addr & IN_CLASSA_NET) !=
                    644:            htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))) {
                    645:                m_freem(m);     /* Bad return address */
                    646:                goto done;      /* ip_output() will check for broadcast */
                    647:        }
                    648:        t = ip->ip_dst;
                    649:        ip->ip_dst = ip->ip_src;
                    650:        /*
                    651:         * If the incoming packet was addressed directly to us,
                    652:         * use dst as the src for the reply.  For broadcast, use
                    653:         * the address which corresponds to the incoming interface.
                    654:         */
                    655:        TAILQ_FOREACH(ia, &in_ifaddr, ia_list) {
                    656:                if (t.s_addr == ia->ia_addr.sin_addr.s_addr)
                    657:                        break;
                    658:                if ((ia->ia_ifp->if_flags & IFF_BROADCAST) &&
                    659:                    t.s_addr == ia->ia_broadaddr.sin_addr.s_addr)
                    660:                        break;
                    661:        }
                    662:        /*
                    663:         * The following happens if the packet was not addressed to us.
                    664:         * Use the new source address and do a route lookup. If it fails
                    665:         * drop the packet as there is no path to the host.
                    666:         */
                    667:        if (ia == (struct in_ifaddr *)0) {
                    668:                struct sockaddr_in *dst;
                    669:                struct route ro;
                    670:
                    671:                bzero((caddr_t) &ro, sizeof(ro));
                    672:                dst = satosin(&ro.ro_dst);
                    673:                dst->sin_family = AF_INET;
                    674:                dst->sin_len = sizeof(*dst);
                    675:                dst->sin_addr = ip->ip_src;
                    676:
                    677:                rtalloc(&ro);
                    678:                if (ro.ro_rt == 0) {
                    679:                        ipstat.ips_noroute++;
                    680:                        m_freem(m);
                    681:                        goto done;
                    682:                }
                    683:
                    684:                ia = ifatoia(ro.ro_rt->rt_ifa);
                    685:                ro.ro_rt->rt_use++;
                    686:                RTFREE(ro.ro_rt);
                    687:        }
                    688:
                    689:        t = ia->ia_addr.sin_addr;
                    690:        ip->ip_src = t;
                    691:        ip->ip_ttl = MAXTTL;
                    692:
                    693:        if (optlen > 0) {
                    694:                u_char *cp;
                    695:                int opt, cnt;
                    696:                u_int len;
                    697:
                    698:                /*
                    699:                 * Retrieve any source routing from the incoming packet;
                    700:                 * add on any record-route or timestamp options.
                    701:                 */
                    702:                cp = (u_char *) (ip + 1);
                    703:                if ((opts = ip_srcroute()) == 0 &&
                    704:                    (opts = m_gethdr(M_DONTWAIT, MT_HEADER))) {
                    705:                        opts->m_len = sizeof(struct in_addr);
                    706:                        mtod(opts, struct in_addr *)->s_addr = 0;
                    707:                }
                    708:                if (opts) {
                    709: #ifdef ICMPPRINTFS
                    710:                        if (icmpprintfs)
                    711:                                printf("icmp_reflect optlen %d rt %d => ",
                    712:                                    optlen, opts->m_len);
                    713: #endif
                    714:                        for (cnt = optlen; cnt > 0; cnt -= len, cp += len) {
                    715:                                opt = cp[IPOPT_OPTVAL];
                    716:                                if (opt == IPOPT_EOL)
                    717:                                        break;
                    718:                                if (opt == IPOPT_NOP)
                    719:                                        len = 1;
                    720:                                else {
                    721:                                        if (cnt < IPOPT_OLEN + sizeof(*cp))
                    722:                                                break;
                    723:                                        len = cp[IPOPT_OLEN];
                    724:                                        if (len < IPOPT_OLEN + sizeof(*cp) ||
                    725:                                            len > cnt)
                    726:                                                break;
                    727:                                }
                    728:                                /*
                    729:                                 * Should check for overflow, but it
                    730:                                 * "can't happen"
                    731:                                 */
                    732:                                if (opt == IPOPT_RR || opt == IPOPT_TS ||
                    733:                                    opt == IPOPT_SECURITY) {
                    734:                                        bcopy((caddr_t)cp,
                    735:                                            mtod(opts, caddr_t) + opts->m_len,
                    736:                                            len);
                    737:                                        opts->m_len += len;
                    738:                                }
                    739:                        }
                    740:                        /* Terminate & pad, if necessary */
                    741:                        if ((cnt = opts->m_len % 4) != 0)
                    742:                                for (; cnt < 4; cnt++) {
                    743:                                        *(mtod(opts, caddr_t) + opts->m_len) =
                    744:                                            IPOPT_EOL;
                    745:                                        opts->m_len++;
                    746:                                }
                    747: #ifdef ICMPPRINTFS
                    748:                        if (icmpprintfs)
                    749:                                printf("%d\n", opts->m_len);
                    750: #endif
                    751:                }
                    752:                /*
                    753:                 * Now strip out original options by copying rest of first
                    754:                 * mbuf's data back, and adjust the IP length.
                    755:                 */
                    756:                ip->ip_len = htons(ntohs(ip->ip_len) - optlen);
                    757:                ip->ip_hl = sizeof(struct ip) >> 2;
                    758:                m->m_len -= optlen;
                    759:                if (m->m_flags & M_PKTHDR)
                    760:                        m->m_pkthdr.len -= optlen;
                    761:                optlen += sizeof(struct ip);
                    762:                bcopy((caddr_t)ip + optlen, (caddr_t)(ip + 1),
                    763:                    (unsigned)(m->m_len - sizeof(struct ip)));
                    764:        }
                    765:        m->m_flags &= ~(M_BCAST|M_MCAST);
                    766:        icmp_send(m, opts);
                    767: done:
                    768:        if (opts)
                    769:                (void)m_free(opts);
                    770: }
                    771:
                    772: /*
                    773:  * Send an icmp packet back to the ip level,
                    774:  * after supplying a checksum.
                    775:  */
                    776: void
                    777: icmp_send(struct mbuf *m, struct mbuf *opts)
                    778: {
                    779:        struct ip *ip = mtod(m, struct ip *);
                    780:        int hlen;
                    781:        struct icmp *icp;
                    782:
                    783:        hlen = ip->ip_hl << 2;
                    784:        m->m_data += hlen;
                    785:        m->m_len -= hlen;
                    786:        icp = mtod(m, struct icmp *);
                    787:        icp->icmp_cksum = 0;
                    788:        icp->icmp_cksum = in_cksum(m, ntohs(ip->ip_len) - hlen);
                    789:        m->m_data -= hlen;
                    790:        m->m_len += hlen;
                    791: #ifdef ICMPPRINTFS
                    792:        if (icmpprintfs) {
                    793:                char buf[4 * sizeof("123")];
                    794:
                    795:                strlcpy(buf, inet_ntoa(ip->ip_dst), sizeof buf);
                    796:                printf("icmp_send dst %s src %s\n",
                    797:                    buf, inet_ntoa(ip->ip_src));
                    798:        }
                    799: #endif
                    800:        (void)ip_output(m, opts, (void *)NULL, 0, (void *)NULL, (void *)NULL);
                    801: }
                    802:
                    803: n_time
                    804: iptime(void)
                    805: {
                    806:        struct timeval atv;
                    807:        u_long t;
                    808:
                    809:        microtime(&atv);
                    810:        t = (atv.tv_sec % (24*60*60)) * 1000 + atv.tv_usec / 1000;
                    811:        return (htonl(t));
                    812: }
                    813:
                    814: int
                    815: icmp_sysctl(int *name, u_int namelen, void *oldp, size_t *oldlenp, void *newp,
                    816:     size_t newlen)
                    817: {
                    818:
                    819:        /* All sysctl names at this level are terminal. */
                    820:        if (namelen != 1)
                    821:                return (ENOTDIR);
                    822:
                    823:        switch (name[0]) {
                    824:        case ICMPCTL_REDIRTIMEOUT: {
                    825:                int error;
                    826:
                    827:                error = sysctl_int(oldp, oldlenp, newp, newlen,
                    828:                    &icmp_redirtimeout);
                    829:                if (icmp_redirect_timeout_q != NULL) {
                    830:                        if (icmp_redirtimeout == 0) {
                    831:                                rt_timer_queue_destroy(icmp_redirect_timeout_q,
                    832:                                    TRUE);
                    833:                                icmp_redirect_timeout_q = NULL;
                    834:                        } else
                    835:                                rt_timer_queue_change(icmp_redirect_timeout_q,
                    836:                                    icmp_redirtimeout);
                    837:                } else if (icmp_redirtimeout > 0) {
                    838:                        icmp_redirect_timeout_q =
                    839:                            rt_timer_queue_create(icmp_redirtimeout);
                    840:                }
                    841:                return (error);
                    842:
                    843:                break;
                    844:        }
                    845:        default:
                    846:                if (name[0] < ICMPCTL_MAXID)
                    847:                        return (sysctl_int_arr(icmpctl_vars, name, namelen,
                    848:                            oldp, oldlenp, newp, newlen));
                    849:                return (ENOPROTOOPT);
                    850:        }
                    851:        /* NOTREACHED */
                    852: }
                    853:
                    854:
                    855: /* XXX only handles table 0 right now */
                    856: struct rtentry *
                    857: icmp_mtudisc_clone(struct sockaddr *dst)
                    858: {
                    859:        struct rtentry *rt;
                    860:        int error;
                    861:
                    862:        rt = rtalloc1(dst, 1, 0);
                    863:        if (rt == 0)
                    864:                return (NULL);
                    865:
                    866:        /* If we didn't get a host route, allocate one */
                    867:
                    868:        if ((rt->rt_flags & RTF_HOST) == 0) {
                    869:                struct rtentry *nrt;
                    870:
                    871:                error = rtrequest((int) RTM_ADD, dst,
                    872:                    (struct sockaddr *) rt->rt_gateway,
                    873:                    (struct sockaddr *) 0,
                    874:                    RTF_GATEWAY | RTF_HOST | RTF_DYNAMIC, &nrt, 0);
                    875:                if (error) {
                    876:                        rtfree(rt);
                    877:                        return (NULL);
                    878:                }
                    879:                nrt->rt_rmx = rt->rt_rmx;
                    880:                rtfree(rt);
                    881:                rt = nrt;
                    882:        }
                    883:        error = rt_timer_add(rt, icmp_mtudisc_timeout, ip_mtudisc_timeout_q);
                    884:        if (error) {
                    885:                rtfree(rt);
                    886:                return (NULL);
                    887:        }
                    888:
                    889:        return (rt);
                    890: }
                    891:
                    892: void
                    893: icmp_mtudisc(struct icmp *icp)
                    894: {
                    895:        struct rtentry *rt;
                    896:        struct sockaddr *dst = sintosa(&icmpsrc);
                    897:        u_long mtu = ntohs(icp->icmp_nextmtu);  /* Why a long?  IPv6 */
                    898:
                    899:        /* Table of common MTUs: */
                    900:
                    901:        static u_short mtu_table[] = {
                    902:                65535, 65280, 32000, 17914, 9180, 8166,
                    903:                4352, 2002, 1492, 1006, 508, 296, 68, 0
                    904:        };
                    905:
                    906:        rt = icmp_mtudisc_clone(dst);
                    907:        if (rt == 0)
                    908:                return;
                    909:
                    910:        if (mtu == 0) {
                    911:                int i = 0;
                    912:
                    913:                mtu = ntohs(icp->icmp_ip.ip_len);
                    914:                /* Some 4.2BSD-based routers incorrectly adjust the ip_len */
                    915:                if (mtu > rt->rt_rmx.rmx_mtu && rt->rt_rmx.rmx_mtu != 0)
                    916:                        mtu -= (icp->icmp_ip.ip_hl << 2);
                    917:
                    918:                /* If we still can't guess a value, try the route */
                    919:
                    920:                if (mtu == 0) {
                    921:                        mtu = rt->rt_rmx.rmx_mtu;
                    922:
                    923:                        /* If no route mtu, default to the interface mtu */
                    924:
                    925:                        if (mtu == 0)
                    926:                                mtu = rt->rt_ifp->if_mtu;
                    927:                }
                    928:
                    929:                for (i = 0; i < sizeof(mtu_table) / sizeof(mtu_table[0]); i++)
                    930:                        if (mtu > mtu_table[i]) {
                    931:                                mtu = mtu_table[i];
                    932:                                break;
                    933:                        }
                    934:        }
                    935:
                    936:        /*
                    937:         * XXX:   RTV_MTU is overloaded, since the admin can set it
                    938:         *        to turn off PMTU for a route, and the kernel can
                    939:         *        set it to indicate a serious problem with PMTU
                    940:         *        on a route.  We should be using a separate flag
                    941:         *        for the kernel to indicate this.
                    942:         */
                    943:
                    944:        if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0) {
                    945:                if (mtu < 296 || mtu > rt->rt_ifp->if_mtu)
                    946:                        rt->rt_rmx.rmx_locks |= RTV_MTU;
                    947:                else if (rt->rt_rmx.rmx_mtu > mtu ||
                    948:                    rt->rt_rmx.rmx_mtu == 0)
                    949:                        rt->rt_rmx.rmx_mtu = mtu;
                    950:        }
                    951:
                    952:        rtfree(rt);
                    953: }
                    954:
                    955: /* XXX only handles table 0 right now */
                    956: void
                    957: icmp_mtudisc_timeout(struct rtentry *rt, struct rttimer *r)
                    958: {
                    959:        if (rt == NULL)
                    960:                panic("icmp_mtudisc_timeout:  bad route to timeout");
                    961:        if ((rt->rt_flags & (RTF_DYNAMIC | RTF_HOST)) ==
                    962:            (RTF_DYNAMIC | RTF_HOST)) {
                    963:                void *(*ctlfunc)(int, struct sockaddr *, void *);
                    964:                extern u_char ip_protox[];
                    965:                struct sockaddr_in sa;
                    966:
                    967:                sa = *(struct sockaddr_in *)rt_key(rt);
                    968:                rtrequest((int) RTM_DELETE, (struct sockaddr *)rt_key(rt),
                    969:                    rt->rt_gateway, rt_mask(rt), rt->rt_flags, 0, 0);
                    970:
                    971:                /* Notify TCP layer of increased Path MTU estimate */
                    972:                ctlfunc = inetsw[ip_protox[IPPROTO_TCP]].pr_ctlinput;
                    973:                if (ctlfunc)
                    974:                        (*ctlfunc)(PRC_MTUINC,(struct sockaddr *)&sa, NULL);
                    975:        } else
                    976:                if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0)
                    977:                        rt->rt_rmx.rmx_mtu = 0;
                    978: }
                    979:
                    980: /*
                    981:  * Perform rate limit check.
                    982:  * Returns 0 if it is okay to send the icmp packet.
                    983:  * Returns 1 if the router SHOULD NOT send this icmp packet due to rate
                    984:  * limitation.
                    985:  *
                    986:  * XXX per-destination/type check necessary?
                    987:  */
                    988: int
                    989: icmp_ratelimit(const struct in_addr *dst, const int type, const int code)
                    990: {
                    991:
                    992:        /* PPS limit */
                    993:        if (!ppsratecheck(&icmperrppslim_last, &icmperrpps_count,
                    994:            icmperrppslim))
                    995:                return 1;
                    996:
                    997:        /*okay to send*/
                    998:        return 0;
                    999: }
                   1000:
                   1001: /* XXX only handles table 0 right now */
                   1002: void
                   1003: icmp_redirect_timeout(struct rtentry *rt, struct rttimer *r)
                   1004: {
                   1005:        if (rt == NULL)
                   1006:                panic("icmp_redirect_timeout:  bad route to timeout");
                   1007:        if ((rt->rt_flags & (RTF_DYNAMIC | RTF_HOST)) ==
                   1008:            (RTF_DYNAMIC | RTF_HOST)) {
                   1009:                rtrequest((int) RTM_DELETE, (struct sockaddr *)rt_key(rt),
                   1010:                    rt->rt_gateway, rt_mask(rt), rt->rt_flags, 0, 0);
                   1011:        }
                   1012: }

CVSweb