xref: /csrg-svn/sys/netinet/ip_output.c (revision 33598)
123745Skarels /*
229144Smckusick  * Copyright (c) 1982, 1986 Regents of the University of California.
332787Sbostic  * All rights reserved.
423745Skarels  *
532787Sbostic  * Redistribution and use in source and binary forms are permitted
632787Sbostic  * provided that this notice is preserved and that due credit is given
732787Sbostic  * to the University of California at Berkeley. The name of the University
832787Sbostic  * may not be used to endorse or promote products derived from this
932787Sbostic  * software without specific prior written permission. This software
1032787Sbostic  * is provided ``as is'' without express or implied warranty.
1132787Sbostic  *
12*33598Skarels  *	@(#)ip_output.c	7.8 (Berkeley) 02/26/88
1323745Skarels  */
144571Swnj 
1517061Sbloom #include "param.h"
1617061Sbloom #include "mbuf.h"
1717061Sbloom #include "errno.h"
1824814Skarels #include "protosw.h"
1917061Sbloom #include "socket.h"
2017061Sbloom #include "socketvar.h"
2110893Ssam 
2210893Ssam #include "../net/if.h"
2310893Ssam #include "../net/route.h"
2410893Ssam 
2517061Sbloom #include "in.h"
2624814Skarels #include "in_pcb.h"
2717061Sbloom #include "in_systm.h"
2818375Skarels #include "in_var.h"
2917061Sbloom #include "ip.h"
3017061Sbloom #include "ip_var.h"
314496Swnj 
3212460Ssam #ifdef vax
3329923Skarels #include "../machine/mtpr.h"
3412460Ssam #endif
3510893Ssam 
3624814Skarels struct mbuf *ip_insertoptions();
3724814Skarels 
3824814Skarels /*
3924814Skarels  * IP output.  The packet in mbuf chain m contains a skeletal IP
4031037Skarels  * header (with len, off, ttl, proto, tos, src, dst).
4131037Skarels  * The mbuf chain containing the packet will be freed.
4231037Skarels  * The mbuf opt, if present, will not be freed.
4324814Skarels  */
44*33598Skarels ip_output(m0, opt, ro, flags)
45*33598Skarels 	struct mbuf *m0;
465085Swnj 	struct mbuf *opt;
476339Ssam 	struct route *ro;
4812417Ssam 	int flags;
494496Swnj {
50*33598Skarels 	register struct ip *ip, *mhip;
515085Swnj 	register struct ifnet *ifp;
52*33598Skarels 	register struct mbuf *m = m0;
53*33598Skarels 	register int hlen = sizeof (struct ip);
54*33598Skarels 	int len, off, error = 0;
556339Ssam 	struct route iproute;
5616602Ssam 	struct sockaddr_in *dst;
574496Swnj 
58*33598Skarels 	if (opt) {
59*33598Skarels 		m = ip_insertoptions(m, opt, &len);
60*33598Skarels 		hlen = len;
61*33598Skarels 	}
6224814Skarels 	ip = mtod(m, struct ip *);
634924Swnj 	/*
644924Swnj 	 * Fill in IP header.
654924Swnj 	 */
6612417Ssam 	if ((flags & IP_FORWARDING) == 0) {
6712417Ssam 		ip->ip_v = IPVERSION;
6812417Ssam 		ip->ip_off &= IP_DF;
6912417Ssam 		ip->ip_id = htons(ip_id++);
7016545Skarels 		ip->ip_hl = hlen >> 2;
7124814Skarels 	} else
7224814Skarels 		hlen = ip->ip_hl << 2;
734496Swnj 
744545Swnj 	/*
757155Swnj 	 * Route packet.
765085Swnj 	 */
776339Ssam 	if (ro == 0) {
786339Ssam 		ro = &iproute;
796339Ssam 		bzero((caddr_t)ro, sizeof (*ro));
805085Swnj 	}
8116602Ssam 	dst = (struct sockaddr_in *)&ro->ro_dst;
8226156Skarels 	/*
8326156Skarels 	 * If there is a cached route,
8426156Skarels 	 * check that it is to the same destination
8526156Skarels 	 * and is still up.  If not, free it and try again.
8626156Skarels 	 */
8726156Skarels 	if (ro->ro_rt && ((ro->ro_rt->rt_flags & RTF_UP) == 0 ||
8826156Skarels 	   dst->sin_addr.s_addr != ip->ip_dst.s_addr)) {
8926156Skarels 		RTFREE(ro->ro_rt);
9026156Skarels 		ro->ro_rt = (struct rtentry *)0;
9126156Skarels 	}
926339Ssam 	if (ro->ro_rt == 0) {
9316602Ssam 		dst->sin_family = AF_INET;
9416602Ssam 		dst->sin_addr = ip->ip_dst;
9526058Skarels 	}
9626058Skarels 	/*
9726058Skarels 	 * If routing to interface only,
9826058Skarels 	 * short circuit routing lookup.
9926058Skarels 	 */
10026058Skarels 	if (flags & IP_ROUTETOIF) {
10126058Skarels 		struct in_ifaddr *ia;
10227196Skarels 
10327973Skarels 		ia = (struct in_ifaddr *)ifa_ifwithdstaddr(dst);
10427196Skarels 		if (ia == 0)
10527196Skarels 			ia = in_iaonnetof(in_netof(ip->ip_dst));
10626058Skarels 		if (ia == 0) {
10726058Skarels 			error = ENETUNREACH;
10826058Skarels 			goto bad;
10926058Skarels 		}
11026058Skarels 		ifp = ia->ia_ifp;
11126058Skarels 	} else {
11226058Skarels 		if (ro->ro_rt == 0)
11326058Skarels 			rtalloc(ro);
11426058Skarels 		if (ro->ro_rt == 0 || (ifp = ro->ro_rt->rt_ifp) == 0) {
11531200Skarels 			if (in_localaddr(ip->ip_dst))
11631200Skarels 				error = EHOSTUNREACH;
11731200Skarels 			else
11831200Skarels 				error = ENETUNREACH;
11926058Skarels 			goto bad;
12026058Skarels 		}
12126058Skarels 		ro->ro_rt->rt_use++;
12230761Skarels 		if (ro->ro_rt->rt_flags & RTF_GATEWAY)
12326058Skarels 			dst = (struct sockaddr_in *)&ro->ro_rt->rt_gateway;
1246339Ssam 	}
12523745Skarels #ifndef notdef
1267155Swnj 	/*
12723745Skarels 	 * If source address not specified yet, use address
12823745Skarels 	 * of outgoing interface.
12923745Skarels 	 */
13023745Skarels 	if (ip->ip_src.s_addr == INADDR_ANY) {
13123745Skarels 		register struct in_ifaddr *ia;
13223745Skarels 
13323745Skarels 		for (ia = in_ifaddr; ia; ia = ia->ia_next)
13423745Skarels 			if (ia->ia_ifp == ifp) {
13523745Skarels 				ip->ip_src = IA_SIN(ia)->sin_addr;
13623745Skarels 				break;
13723745Skarels 			}
13823745Skarels 	}
13923745Skarels #endif
14023745Skarels 	/*
14110402Ssam 	 * Look for broadcast address and
14210402Ssam 	 * and verify user is allowed to send
14310146Ssam 	 * such a packet.
1447155Swnj 	 */
14518375Skarels 	if (in_broadcast(dst->sin_addr)) {
14610146Ssam 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
14710146Ssam 			error = EADDRNOTAVAIL;
14810146Ssam 			goto bad;
14910146Ssam 		}
15012417Ssam 		if ((flags & IP_ALLOWBROADCAST) == 0) {
1517155Swnj 			error = EACCES;
1526339Ssam 			goto bad;
1536505Ssam 		}
15410146Ssam 		/* don't allow broadcast messages to be fragmented */
15510146Ssam 		if (ip->ip_len > ifp->if_mtu) {
15610146Ssam 			error = EMSGSIZE;
15710146Ssam 			goto bad;
15810146Ssam 		}
1596339Ssam 	}
1606339Ssam 
1615085Swnj 	/*
1624924Swnj 	 * If small enough for interface, can just send directly.
1634545Swnj 	 */
1645085Swnj 	if (ip->ip_len <= ifp->if_mtu) {
1655085Swnj 		ip->ip_len = htons((u_short)ip->ip_len);
1665085Swnj 		ip->ip_off = htons((u_short)ip->ip_off);
1675085Swnj 		ip->ip_sum = 0;
1685085Swnj 		ip->ip_sum = in_cksum(m, hlen);
16916602Ssam 		error = (*ifp->if_output)(ifp, m, (struct sockaddr *)dst);
1707155Swnj 		goto done;
1714908Swnj 	}
1724924Swnj 
1734924Swnj 	/*
1744924Swnj 	 * Too large for interface; fragment if possible.
1754924Swnj 	 * Must be able to put at least 8 bytes per fragment.
1764924Swnj 	 */
1776505Ssam 	if (ip->ip_off & IP_DF) {
1786505Ssam 		error = EMSGSIZE;
1794924Swnj 		goto bad;
1806505Ssam 	}
1815085Swnj 	len = (ifp->if_mtu - hlen) &~ 7;
1826505Ssam 	if (len < 8) {
1836505Ssam 		error = EMSGSIZE;
1844924Swnj 		goto bad;
1856505Ssam 	}
1864924Swnj 
1874924Swnj 	/*
1884924Swnj 	 * Discard IP header from logical mbuf for m_copy's sake.
1894924Swnj 	 * Loop through length of segment, make a copy of each
1904924Swnj 	 * part and output.
1914924Swnj 	 */
192*33598Skarels 	m->m_len -= hlen;
193*33598Skarels 	m->m_off += hlen;
194*33598Skarels 	m0 = m;
195*33598Skarels 	for (off = 0; off < ip->ip_len - hlen; off += len) {
196*33598Skarels 		int mhlen;
1974924Swnj 
198*33598Skarels 		MGET(m, M_DONTWAIT, MT_HEADER);
199*33598Skarels 		if (m == 0) {
2006505Ssam 			error = ENOBUFS;
2014924Swnj 			goto bad;
2026505Ssam 		}
203*33598Skarels 		m->m_off = MMAXOFF - hlen;
204*33598Skarels 		mhip = mtod(m, struct ip *);
2054924Swnj 		*mhip = *ip;
2064952Swnj 		if (hlen > sizeof (struct ip)) {
207*33598Skarels 			mhlen = ip_optcopy(ip, mhip, off) + sizeof (struct ip);
208*33598Skarels 			mhip->ip_hl = mhlen >> 2;
2094924Swnj 		} else
210*33598Skarels 			mhlen = sizeof (struct ip);
211*33598Skarels 		m->m_len = mhlen;
21227738Skarels 		mhip->ip_off = (off >> 3) + (ip->ip_off & ~IP_MF);
21316545Skarels 		if (ip->ip_off & IP_MF)
21416545Skarels 			mhip->ip_off |= IP_MF;
215*33598Skarels 		if (off + len >= ip->ip_len - hlen)
216*33598Skarels 			len = ip->ip_len - hlen - off;
217*33598Skarels 		else
2184924Swnj 			mhip->ip_off |= IP_MF;
219*33598Skarels 		mhip->ip_len = htons((u_short)(len + mhlen));
220*33598Skarels 		m->m_next = m_copy(m0, off, len);
221*33598Skarels 		if (m->m_next == 0) {
222*33598Skarels 			(void) m_free(m);
2236505Ssam 			error = ENOBUFS;	/* ??? */
2244924Swnj 			goto bad;
2254674Swnj 		}
2265892Sroot 		mhip->ip_off = htons((u_short)mhip->ip_off);
2275892Sroot 		mhip->ip_sum = 0;
228*33598Skarels 		mhip->ip_sum = in_cksum(m, mhlen);
229*33598Skarels 		if (error = (*ifp->if_output)(ifp, m, (struct sockaddr *)dst))
2306505Ssam 			break;
2314924Swnj 	}
2324924Swnj bad:
233*33598Skarels 	m_freem(m0);
2347155Swnj done:
23512417Ssam 	if (ro == &iproute && (flags & IP_ROUTETOIF) == 0 && ro->ro_rt)
2367155Swnj 		RTFREE(ro->ro_rt);
2376505Ssam 	return (error);
2384924Swnj }
2394924Swnj 
2404924Swnj /*
24124814Skarels  * Insert IP options into preformed packet.
24224814Skarels  * Adjust IP destination as required for IP source routing,
24324814Skarels  * as indicated by a non-zero in_addr at the start of the options.
24424814Skarels  */
24524814Skarels struct mbuf *
24624814Skarels ip_insertoptions(m, opt, phlen)
24724814Skarels 	register struct mbuf *m;
24824814Skarels 	struct mbuf *opt;
24924814Skarels 	int *phlen;
25024814Skarels {
25124814Skarels 	register struct ipoption *p = mtod(opt, struct ipoption *);
25224814Skarels 	struct mbuf *n;
25324814Skarels 	register struct ip *ip = mtod(m, struct ip *);
25426385Skarels 	unsigned optlen;
25524814Skarels 
25624814Skarels 	optlen = opt->m_len - sizeof(p->ipopt_dst);
25724814Skarels 	if (p->ipopt_dst.s_addr)
25824814Skarels 		ip->ip_dst = p->ipopt_dst;
25924814Skarels 	if (m->m_off >= MMAXOFF || MMINOFF + optlen > m->m_off) {
26024814Skarels 		MGET(n, M_DONTWAIT, MT_HEADER);
26124814Skarels 		if (n == 0)
26224814Skarels 			return (m);
26324814Skarels 		m->m_len -= sizeof(struct ip);
26424814Skarels 		m->m_off += sizeof(struct ip);
26524814Skarels 		n->m_next = m;
26624814Skarels 		m = n;
26724814Skarels 		m->m_off = MMAXOFF - sizeof(struct ip) - optlen;
26824814Skarels 		m->m_len = optlen + sizeof(struct ip);
26924814Skarels 		bcopy((caddr_t)ip, mtod(m, caddr_t), sizeof(struct ip));
27024814Skarels 	} else {
27124814Skarels 		m->m_off -= optlen;
27224814Skarels 		m->m_len += optlen;
27324814Skarels 		ovbcopy((caddr_t)ip, mtod(m, caddr_t), sizeof(struct ip));
27424814Skarels 	}
27524814Skarels 	ip = mtod(m, struct ip *);
27626385Skarels 	bcopy((caddr_t)p->ipopt_list, (caddr_t)(ip + 1), (unsigned)optlen);
27724814Skarels 	*phlen = sizeof(struct ip) + optlen;
27824814Skarels 	ip->ip_len += optlen;
27924814Skarels 	return (m);
28024814Skarels }
28124814Skarels 
28224814Skarels /*
2834924Swnj  * Copy options from ip to jp.
2844952Swnj  * If off is 0 all options are copied
2854924Swnj  * otherwise copy selectively.
2864924Swnj  */
2874924Swnj ip_optcopy(ip, jp, off)
2884924Swnj 	struct ip *ip, *jp;
2894924Swnj 	int off;
2904924Swnj {
2914924Swnj 	register u_char *cp, *dp;
2924924Swnj 	int opt, optlen, cnt;
2934924Swnj 
2944924Swnj 	cp = (u_char *)(ip + 1);
2954924Swnj 	dp = (u_char *)(jp + 1);
2964924Swnj 	cnt = (ip->ip_hl << 2) - sizeof (struct ip);
2974924Swnj 	for (; cnt > 0; cnt -= optlen, cp += optlen) {
2984924Swnj 		opt = cp[0];
2994924Swnj 		if (opt == IPOPT_EOL)
3004924Swnj 			break;
3014924Swnj 		if (opt == IPOPT_NOP)
3024924Swnj 			optlen = 1;
3034924Swnj 		else
30424814Skarels 			optlen = cp[IPOPT_OLEN];
3054924Swnj 		if (optlen > cnt)			/* XXX */
3064924Swnj 			optlen = cnt;			/* XXX */
3074924Swnj 		if (off == 0 || IPOPT_COPIED(opt)) {
3084952Swnj 			bcopy((caddr_t)cp, (caddr_t)dp, (unsigned)optlen);
3094924Swnj 			dp += optlen;
3104674Swnj 		}
3114545Swnj 	}
3124924Swnj 	for (optlen = dp - (u_char *)(jp+1); optlen & 0x3; optlen++)
3134924Swnj 		*dp++ = IPOPT_EOL;
3144924Swnj 	return (optlen);
3154496Swnj }
31624814Skarels 
31724814Skarels /*
31824814Skarels  * IP socket option processing.
31924814Skarels  */
32024814Skarels ip_ctloutput(op, so, level, optname, m)
32124814Skarels 	int op;
32224814Skarels 	struct socket *so;
32324814Skarels 	int level, optname;
32424814Skarels 	struct mbuf **m;
32524814Skarels {
32624814Skarels 	int error = 0;
32724814Skarels 	struct inpcb *inp = sotoinpcb(so);
32824814Skarels 
32924814Skarels 	if (level != IPPROTO_IP)
33024814Skarels 		error = EINVAL;
33124814Skarels 	else switch (op) {
33224814Skarels 
33324814Skarels 	case PRCO_SETOPT:
33424814Skarels 		switch (optname) {
33524814Skarels 		case IP_OPTIONS:
33626036Skarels 			return (ip_pcbopts(&inp->inp_options, *m));
33724814Skarels 
33824814Skarels 		default:
33924814Skarels 			error = EINVAL;
34024814Skarels 			break;
34124814Skarels 		}
34224814Skarels 		break;
34324814Skarels 
34424814Skarels 	case PRCO_GETOPT:
34524814Skarels 		switch (optname) {
34624814Skarels 		case IP_OPTIONS:
34724814Skarels 			*m = m_get(M_WAIT, MT_SOOPTS);
34824814Skarels 			if (inp->inp_options) {
34924814Skarels 				(*m)->m_off = inp->inp_options->m_off;
35024814Skarels 				(*m)->m_len = inp->inp_options->m_len;
35124814Skarels 				bcopy(mtod(inp->inp_options, caddr_t),
35226385Skarels 				    mtod(*m, caddr_t), (unsigned)(*m)->m_len);
35324814Skarels 			} else
35424814Skarels 				(*m)->m_len = 0;
35524814Skarels 			break;
35624814Skarels 		default:
35724814Skarels 			error = EINVAL;
35824814Skarels 			break;
35924814Skarels 		}
36024814Skarels 		break;
36124814Skarels 	}
36231649Smckusick 	if (op == PRCO_SETOPT && *m)
36326385Skarels 		(void)m_free(*m);
36424814Skarels 	return (error);
36524814Skarels }
36624814Skarels 
36724814Skarels /*
36826036Skarels  * Set up IP options in pcb for insertion in output packets.
36926036Skarels  * Store in mbuf with pointer in pcbopt, adding pseudo-option
37026036Skarels  * with destination address if source routed.
37124814Skarels  */
37226036Skarels ip_pcbopts(pcbopt, m)
37326036Skarels 	struct mbuf **pcbopt;
37426036Skarels 	register struct mbuf *m;
37524814Skarels {
37624814Skarels 	register cnt, optlen;
37724814Skarels 	register u_char *cp;
37824814Skarels 	u_char opt;
37924814Skarels 
38024814Skarels 	/* turn off any old options */
38126036Skarels 	if (*pcbopt)
38226385Skarels 		(void)m_free(*pcbopt);
38326036Skarels 	*pcbopt = 0;
38424814Skarels 	if (m == (struct mbuf *)0 || m->m_len == 0) {
38524814Skarels 		/*
38624814Skarels 		 * Only turning off any previous options.
38724814Skarels 		 */
38824814Skarels 		if (m)
38926385Skarels 			(void)m_free(m);
39024814Skarels 		return (0);
39124814Skarels 	}
39224814Skarels 
39324814Skarels #ifndef	vax
39424814Skarels 	if (m->m_len % sizeof(long))
39524814Skarels 		goto bad;
39624814Skarels #endif
39724814Skarels 	/*
39824814Skarels 	 * IP first-hop destination address will be stored before
39924814Skarels 	 * actual options; move other options back
40024814Skarels 	 * and clear it when none present.
40124814Skarels 	 */
40224814Skarels #if	MAX_IPOPTLEN >= MMAXOFF - MMINOFF
40324814Skarels 	if (m->m_off + m->m_len + sizeof(struct in_addr) > MAX_IPOPTLEN)
40424814Skarels 		goto bad;
40524814Skarels #else
40624814Skarels 	if (m->m_off + m->m_len + sizeof(struct in_addr) > MMAXOFF)
40724814Skarels 		goto bad;
40824814Skarels #endif
40924814Skarels 	cnt = m->m_len;
41024814Skarels 	m->m_len += sizeof(struct in_addr);
41124814Skarels 	cp = mtod(m, u_char *) + sizeof(struct in_addr);
41226385Skarels 	ovbcopy(mtod(m, caddr_t), (caddr_t)cp, (unsigned)cnt);
41324814Skarels 	bzero(mtod(m, caddr_t), sizeof(struct in_addr));
41424814Skarels 
41524814Skarels 	for (; cnt > 0; cnt -= optlen, cp += optlen) {
41624814Skarels 		opt = cp[IPOPT_OPTVAL];
41724814Skarels 		if (opt == IPOPT_EOL)
41824814Skarels 			break;
41924814Skarels 		if (opt == IPOPT_NOP)
42024814Skarels 			optlen = 1;
42124814Skarels 		else {
42224814Skarels 			optlen = cp[IPOPT_OLEN];
42324814Skarels 			if (optlen <= IPOPT_OLEN || optlen > cnt)
42424814Skarels 				goto bad;
42524814Skarels 		}
42624814Skarels 		switch (opt) {
42724814Skarels 
42824814Skarels 		default:
42924814Skarels 			break;
43024814Skarels 
43124814Skarels 		case IPOPT_LSRR:
43224814Skarels 		case IPOPT_SSRR:
43324814Skarels 			/*
43424814Skarels 			 * user process specifies route as:
43524814Skarels 			 *	->A->B->C->D
43624814Skarels 			 * D must be our final destination (but we can't
43724814Skarels 			 * check that since we may not have connected yet).
43824814Skarels 			 * A is first hop destination, which doesn't appear in
43924814Skarels 			 * actual IP option, but is stored before the options.
44024814Skarels 			 */
44124814Skarels 			if (optlen < IPOPT_MINOFF - 1 + sizeof(struct in_addr))
44224814Skarels 				goto bad;
44324814Skarels 			m->m_len -= sizeof(struct in_addr);
44424814Skarels 			cnt -= sizeof(struct in_addr);
44524814Skarels 			optlen -= sizeof(struct in_addr);
44624814Skarels 			cp[IPOPT_OLEN] = optlen;
44724814Skarels 			/*
44824814Skarels 			 * Move first hop before start of options.
44924814Skarels 			 */
45026385Skarels 			bcopy((caddr_t)&cp[IPOPT_OFFSET+1], mtod(m, caddr_t),
45124814Skarels 			    sizeof(struct in_addr));
45224814Skarels 			/*
45324814Skarels 			 * Then copy rest of options back
45424814Skarels 			 * to close up the deleted entry.
45524814Skarels 			 */
45626385Skarels 			ovbcopy((caddr_t)(&cp[IPOPT_OFFSET+1] +
45726385Skarels 			    sizeof(struct in_addr)),
45826385Skarels 			    (caddr_t)&cp[IPOPT_OFFSET+1],
45926385Skarels 			    (unsigned)cnt + sizeof(struct in_addr));
46024814Skarels 			break;
46124814Skarels 		}
46224814Skarels 	}
46326036Skarels 	*pcbopt = m;
46424814Skarels 	return (0);
46524814Skarels 
46624814Skarels bad:
46726385Skarels 	(void)m_free(m);
46824814Skarels 	return (EINVAL);
46924814Skarels }
470