Home | History | Annotate | Line # | Download | only in netinet
ip_reass.c revision 1.9.12.1
      1  1.9.12.1  martin /*	$NetBSD: ip_reass.c,v 1.9.12.1 2018/04/05 11:50:17 martin Exp $	*/
      2       1.1   rmind 
      3       1.1   rmind /*
      4       1.1   rmind  * Copyright (c) 1982, 1986, 1988, 1993
      5       1.1   rmind  *	The Regents of the University of California.  All rights reserved.
      6       1.1   rmind  *
      7       1.1   rmind  * Redistribution and use in source and binary forms, with or without
      8       1.1   rmind  * modification, are permitted provided that the following conditions
      9       1.1   rmind  * are met:
     10       1.1   rmind  * 1. Redistributions of source code must retain the above copyright
     11       1.1   rmind  *    notice, this list of conditions and the following disclaimer.
     12       1.1   rmind  * 2. Redistributions in binary form must reproduce the above copyright
     13       1.1   rmind  *    notice, this list of conditions and the following disclaimer in the
     14       1.1   rmind  *    documentation and/or other materials provided with the distribution.
     15       1.1   rmind  * 3. Neither the name of the University nor the names of its contributors
     16       1.1   rmind  *    may be used to endorse or promote products derived from this software
     17       1.1   rmind  *    without specific prior written permission.
     18       1.1   rmind  *
     19       1.1   rmind  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     20       1.1   rmind  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21       1.1   rmind  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22       1.1   rmind  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     23       1.1   rmind  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24       1.1   rmind  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25       1.1   rmind  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26       1.1   rmind  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27       1.1   rmind  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28       1.1   rmind  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29       1.1   rmind  * SUCH DAMAGE.
     30       1.1   rmind  *
     31       1.1   rmind  *	@(#)ip_input.c	8.2 (Berkeley) 1/4/94
     32       1.1   rmind  */
     33       1.1   rmind 
     34       1.1   rmind /*
     35       1.1   rmind  * IP reassembly.
     36       1.1   rmind  *
     37       1.1   rmind  * Additive-Increase/Multiplicative-Decrease (AIMD) strategy for IP
     38       1.1   rmind  * reassembly queue buffer managment.
     39       1.1   rmind  *
     40       1.1   rmind  * We keep a count of total IP fragments (NB: not fragmented packets),
     41       1.1   rmind  * awaiting reassembly (ip_nfrags) and a limit (ip_maxfrags) on fragments.
     42       1.1   rmind  * If ip_nfrags exceeds ip_maxfrags the limit, we drop half the total
     43       1.1   rmind  * fragments in reassembly queues.  This AIMD policy avoids repeatedly
     44       1.1   rmind  * deleting single packets under heavy fragmentation load (e.g., from lossy
     45       1.1   rmind  * NFS peers).
     46       1.1   rmind  */
     47       1.1   rmind 
     48       1.1   rmind #include <sys/cdefs.h>
     49  1.9.12.1  martin __KERNEL_RCSID(0, "$NetBSD: ip_reass.c,v 1.9.12.1 2018/04/05 11:50:17 martin Exp $");
     50       1.1   rmind 
     51       1.1   rmind #include <sys/param.h>
     52       1.2   rmind #include <sys/types.h>
     53       1.1   rmind 
     54       1.1   rmind #include <sys/malloc.h>
     55       1.1   rmind #include <sys/mbuf.h>
     56       1.4   rmind #include <sys/mutex.h>
     57       1.1   rmind #include <sys/domain.h>
     58       1.1   rmind #include <sys/protosw.h>
     59       1.1   rmind #include <sys/pool.h>
     60       1.2   rmind #include <sys/queue.h>
     61       1.1   rmind #include <sys/sysctl.h>
     62       1.2   rmind #include <sys/systm.h>
     63       1.1   rmind 
     64       1.1   rmind #include <net/if.h>
     65       1.1   rmind #include <net/route.h>
     66       1.1   rmind 
     67       1.1   rmind #include <netinet/in.h>
     68       1.1   rmind #include <netinet/in_systm.h>
     69       1.1   rmind #include <netinet/ip.h>
     70       1.1   rmind #include <netinet/in_pcb.h>
     71       1.2   rmind #include <netinet/ip_var.h>
     72       1.1   rmind #include <netinet/in_proto.h>
     73       1.1   rmind #include <netinet/ip_private.h>
     74       1.1   rmind #include <netinet/in_var.h>
     75       1.1   rmind 
     76       1.1   rmind /*
     77       1.3   rmind  * IP reassembly queue structures.  Each fragment being reassembled is
     78       1.3   rmind  * attached to one of these structures.  They are timed out after TTL
     79       1.3   rmind  * drops to 0, and may also be reclaimed if memory becomes tight.
     80       1.3   rmind  */
     81       1.3   rmind 
     82       1.3   rmind typedef struct ipfr_qent {
     83       1.3   rmind 	TAILQ_ENTRY(ipfr_qent)	ipqe_q;
     84       1.3   rmind 	struct ip *		ipqe_ip;
     85       1.3   rmind 	struct mbuf *		ipqe_m;
     86       1.3   rmind 	bool			ipqe_mff;
     87       1.3   rmind } ipfr_qent_t;
     88       1.3   rmind 
     89       1.7   rmind TAILQ_HEAD(ipfr_qent_head, ipfr_qent);
     90       1.7   rmind 
     91       1.3   rmind typedef struct ipfr_queue {
     92       1.3   rmind 	LIST_ENTRY(ipfr_queue)	ipq_q;		/* to other reass headers */
     93       1.7   rmind 	struct ipfr_qent_head	ipq_fragq;	/* queue of fragment entries */
     94       1.3   rmind 	uint8_t			ipq_ttl;	/* time for reass q to live */
     95       1.3   rmind 	uint8_t			ipq_p;		/* protocol of this fragment */
     96       1.3   rmind 	uint16_t		ipq_id;		/* sequence id for reassembly */
     97       1.3   rmind 	struct in_addr		ipq_src;
     98       1.3   rmind 	struct in_addr		ipq_dst;
     99       1.3   rmind 	uint16_t		ipq_nfrags;	/* frags in this queue entry */
    100       1.3   rmind 	uint8_t 		ipq_tos;	/* TOS of this fragment */
    101       1.3   rmind } ipfr_queue_t;
    102       1.3   rmind 
    103       1.3   rmind /*
    104       1.3   rmind  * Hash table of IP reassembly queues.
    105       1.1   rmind  */
    106       1.1   rmind #define	IPREASS_HASH_SHIFT	6
    107       1.1   rmind #define	IPREASS_HASH_SIZE	(1 << IPREASS_HASH_SHIFT)
    108       1.1   rmind #define	IPREASS_HASH_MASK	(IPREASS_HASH_SIZE - 1)
    109       1.1   rmind #define	IPREASS_HASH(x, y) \
    110       1.1   rmind 	(((((x) & 0xf) | ((((x) >> 8) & 0xf) << 4)) ^ (y)) & IPREASS_HASH_MASK)
    111       1.1   rmind 
    112       1.3   rmind static LIST_HEAD(, ipfr_queue)	ip_frags[IPREASS_HASH_SIZE];
    113       1.4   rmind static pool_cache_t	ipfren_cache;
    114       1.4   rmind static kmutex_t		ipfr_lock;
    115       1.1   rmind 
    116       1.3   rmind /* Number of packets in reassembly queue and total number of fragments. */
    117       1.3   rmind static int		ip_nfragpackets;
    118       1.3   rmind static int		ip_nfrags;
    119       1.1   rmind 
    120       1.3   rmind /* Limits on packet and fragments. */
    121       1.3   rmind static int		ip_maxfragpackets;
    122       1.3   rmind static int		ip_maxfrags;
    123       1.1   rmind 
    124       1.1   rmind /*
    125       1.3   rmind  * Cached copy of nmbclusters.  If nbclusters is different, recalculate
    126       1.3   rmind  * IP parameters derived from nmbclusters.
    127       1.2   rmind  */
    128       1.3   rmind static int		ip_nmbclusters;
    129       1.1   rmind 
    130       1.1   rmind /*
    131       1.1   rmind  * IP reassembly TTL machinery for multiplicative drop.
    132       1.1   rmind  */
    133       1.3   rmind static u_int		fragttl_histo[IPFRAGTTL + 1];
    134       1.1   rmind 
    135       1.4   rmind static struct sysctllog *ip_reass_sysctllog;
    136       1.4   rmind 
    137       1.3   rmind void			sysctl_ip_reass_setup(void);
    138       1.3   rmind static void		ip_nmbclusters_changed(void);
    139       1.2   rmind 
    140       1.3   rmind static struct mbuf *	ip_reass(ipfr_qent_t *, ipfr_queue_t *, u_int);
    141       1.2   rmind static u_int		ip_reass_ttl_decr(u_int ticks);
    142       1.2   rmind static void		ip_reass_drophalf(void);
    143       1.3   rmind static void		ip_freef(ipfr_queue_t *);
    144       1.1   rmind 
    145       1.1   rmind /*
    146       1.1   rmind  * ip_reass_init:
    147       1.1   rmind  *
    148       1.1   rmind  *	Initialization of IP reassembly mechanism.
    149       1.1   rmind  */
    150       1.1   rmind void
    151       1.1   rmind ip_reass_init(void)
    152       1.1   rmind {
    153       1.1   rmind 	int i;
    154       1.1   rmind 
    155       1.4   rmind 	ipfren_cache = pool_cache_init(sizeof(ipfr_qent_t), coherency_unit,
    156       1.4   rmind 	    0, 0, "ipfrenpl", NULL, IPL_NET, NULL, NULL, NULL);
    157       1.6    yamt 	mutex_init(&ipfr_lock, MUTEX_DEFAULT, IPL_VM);
    158       1.1   rmind 
    159       1.1   rmind 	for (i = 0; i < IPREASS_HASH_SIZE; i++) {
    160       1.3   rmind 		LIST_INIT(&ip_frags[i]);
    161       1.1   rmind 	}
    162       1.1   rmind 	ip_maxfragpackets = 200;
    163       1.1   rmind 	ip_maxfrags = 0;
    164       1.1   rmind 	ip_nmbclusters_changed();
    165       1.1   rmind 
    166       1.1   rmind 	sysctl_ip_reass_setup();
    167       1.1   rmind }
    168       1.1   rmind 
    169       1.1   rmind void
    170       1.1   rmind sysctl_ip_reass_setup(void)
    171       1.1   rmind {
    172       1.1   rmind 
    173       1.1   rmind 	sysctl_createv(&ip_reass_sysctllog, 0, NULL, NULL,
    174       1.1   rmind 		CTLFLAG_PERMANENT,
    175       1.1   rmind 		CTLTYPE_NODE, "inet",
    176       1.1   rmind 		SYSCTL_DESCR("PF_INET related settings"),
    177       1.1   rmind 		NULL, 0, NULL, 0,
    178       1.1   rmind 		CTL_NET, PF_INET, CTL_EOL);
    179       1.1   rmind 	sysctl_createv(&ip_reass_sysctllog, 0, NULL, NULL,
    180       1.1   rmind 		CTLFLAG_PERMANENT,
    181       1.1   rmind 		CTLTYPE_NODE, "ip",
    182       1.1   rmind 		SYSCTL_DESCR("IPv4 related settings"),
    183       1.1   rmind 		NULL, 0, NULL, 0,
    184       1.1   rmind 		CTL_NET, PF_INET, IPPROTO_IP, CTL_EOL);
    185       1.1   rmind 
    186       1.1   rmind 	sysctl_createv(&ip_reass_sysctllog, 0, NULL, NULL,
    187       1.1   rmind 		CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
    188       1.1   rmind 		CTLTYPE_INT, "maxfragpackets",
    189       1.1   rmind 		SYSCTL_DESCR("Maximum number of fragments to retain for "
    190       1.1   rmind 			     "possible reassembly"),
    191       1.1   rmind 		NULL, 0, &ip_maxfragpackets, 0,
    192       1.1   rmind 		CTL_NET, PF_INET, IPPROTO_IP, IPCTL_MAXFRAGPACKETS, CTL_EOL);
    193       1.1   rmind }
    194       1.1   rmind 
    195       1.1   rmind #define CHECK_NMBCLUSTER_PARAMS()				\
    196       1.1   rmind do {								\
    197       1.1   rmind 	if (__predict_false(ip_nmbclusters != nmbclusters))	\
    198       1.1   rmind 		ip_nmbclusters_changed();			\
    199       1.1   rmind } while (/*CONSTCOND*/0)
    200       1.1   rmind 
    201       1.1   rmind /*
    202       1.1   rmind  * Compute IP limits derived from the value of nmbclusters.
    203       1.1   rmind  */
    204       1.1   rmind static void
    205       1.1   rmind ip_nmbclusters_changed(void)
    206       1.1   rmind {
    207       1.1   rmind 	ip_maxfrags = nmbclusters / 4;
    208       1.1   rmind 	ip_nmbclusters = nmbclusters;
    209       1.1   rmind }
    210       1.1   rmind 
    211       1.1   rmind /*
    212       1.1   rmind  * ip_reass:
    213       1.1   rmind  *
    214       1.1   rmind  *	Take incoming datagram fragment and try to reassemble it into whole
    215       1.1   rmind  *	datagram.  If a chain for reassembly of this datagram already exists,
    216       1.1   rmind  *	then it is given as 'fp'; otherwise have to make a chain.
    217       1.1   rmind  */
    218       1.1   rmind struct mbuf *
    219       1.3   rmind ip_reass(ipfr_qent_t *ipqe, ipfr_queue_t *fp, const u_int hash)
    220       1.1   rmind {
    221       1.7   rmind 	struct ip *ip = ipqe->ipqe_ip, *qip;
    222       1.7   rmind 	const int hlen = ip->ip_hl << 2;
    223       1.1   rmind 	struct mbuf *m = ipqe->ipqe_m, *t;
    224       1.3   rmind 	ipfr_qent_t *nq, *p, *q;
    225       1.4   rmind 	int i, next;
    226       1.1   rmind 
    227       1.4   rmind 	KASSERT(mutex_owned(&ipfr_lock));
    228       1.1   rmind 
    229       1.1   rmind 	/*
    230       1.1   rmind 	 * Presence of header sizes in mbufs would confuse code below.
    231       1.1   rmind 	 */
    232       1.1   rmind 	m->m_data += hlen;
    233       1.1   rmind 	m->m_len -= hlen;
    234       1.1   rmind 
    235       1.1   rmind #ifdef	notyet
    236       1.1   rmind 	/* Make sure fragment limit is up-to-date. */
    237       1.1   rmind 	CHECK_NMBCLUSTER_PARAMS();
    238       1.1   rmind 
    239       1.1   rmind 	/* If we have too many fragments, drop the older half. */
    240       1.1   rmind 	if (ip_nfrags >= ip_maxfrags) {
    241       1.1   rmind 		ip_reass_drophalf(void);
    242       1.1   rmind 	}
    243       1.1   rmind #endif
    244       1.1   rmind 
    245       1.1   rmind 	/*
    246       1.1   rmind 	 * We are about to add a fragment; increment frag count.
    247       1.1   rmind 	 */
    248       1.1   rmind 	ip_nfrags++;
    249       1.1   rmind 
    250       1.1   rmind 	/*
    251       1.1   rmind 	 * If first fragment to arrive, create a reassembly queue.
    252       1.1   rmind 	 */
    253       1.1   rmind 	if (fp == NULL) {
    254       1.1   rmind 		/*
    255       1.1   rmind 		 * Enforce upper bound on number of fragmented packets
    256       1.1   rmind 		 * for which we attempt reassembly:  a) if maxfrag is 0,
    257       1.1   rmind 		 * never accept fragments  b) if maxfrag is -1, accept
    258       1.1   rmind 		 * all fragments without limitation.
    259       1.1   rmind 		 */
    260       1.1   rmind 		if (ip_maxfragpackets < 0)
    261       1.1   rmind 			;
    262       1.1   rmind 		else if (ip_nfragpackets >= ip_maxfragpackets) {
    263       1.1   rmind 			goto dropfrag;
    264       1.1   rmind 		}
    265       1.3   rmind 		fp = malloc(sizeof(ipfr_queue_t), M_FTABLE, M_NOWAIT);
    266       1.1   rmind 		if (fp == NULL) {
    267       1.1   rmind 			goto dropfrag;
    268       1.1   rmind 		}
    269       1.8   enami 		ip_nfragpackets++;
    270       1.7   rmind 		TAILQ_INIT(&fp->ipq_fragq);
    271       1.1   rmind 		fp->ipq_nfrags = 1;
    272       1.1   rmind 		fp->ipq_ttl = IPFRAGTTL;
    273       1.7   rmind 		fp->ipq_p = ip->ip_p;
    274       1.7   rmind 		fp->ipq_id = ip->ip_id;
    275       1.7   rmind 		fp->ipq_tos = ip->ip_tos;
    276       1.7   rmind 		fp->ipq_src = ip->ip_src;
    277       1.7   rmind 		fp->ipq_dst = ip->ip_dst;
    278       1.7   rmind 		LIST_INSERT_HEAD(&ip_frags[hash], fp, ipq_q);
    279       1.1   rmind 		p = NULL;
    280       1.1   rmind 		goto insert;
    281       1.1   rmind 	} else {
    282       1.1   rmind 		fp->ipq_nfrags++;
    283       1.1   rmind 	}
    284       1.1   rmind 
    285       1.1   rmind 	/*
    286       1.1   rmind 	 * Find a segment which begins after this one does.
    287       1.1   rmind 	 */
    288       1.7   rmind 	TAILQ_FOREACH(q, &fp->ipq_fragq, ipqe_q) {
    289       1.7   rmind 		if (ntohs(q->ipqe_ip->ip_off) > ntohs(ip->ip_off))
    290       1.1   rmind 			break;
    291       1.7   rmind 	}
    292       1.7   rmind 	if (q != NULL) {
    293       1.7   rmind 		p = TAILQ_PREV(q, ipfr_qent_head, ipqe_q);
    294       1.7   rmind 	} else {
    295       1.7   rmind 		p = TAILQ_LAST(&fp->ipq_fragq, ipfr_qent_head);
    296       1.7   rmind 	}
    297       1.1   rmind 
    298       1.1   rmind 	/*
    299       1.1   rmind 	 * If there is a preceding segment, it may provide some of our
    300       1.1   rmind 	 * data already.  If so, drop the data from the incoming segment.
    301       1.1   rmind 	 * If it provides all of our data, drop us.
    302       1.1   rmind 	 */
    303       1.1   rmind 	if (p != NULL) {
    304       1.1   rmind 		i = ntohs(p->ipqe_ip->ip_off) + ntohs(p->ipqe_ip->ip_len) -
    305       1.7   rmind 		    ntohs(ip->ip_off);
    306       1.1   rmind 		if (i > 0) {
    307       1.7   rmind 			if (i >= ntohs(ip->ip_len)) {
    308       1.1   rmind 				goto dropfrag;
    309       1.1   rmind 			}
    310       1.1   rmind 			m_adj(ipqe->ipqe_m, i);
    311       1.7   rmind 			ip->ip_off = htons(ntohs(ip->ip_off) + i);
    312       1.7   rmind 			ip->ip_len = htons(ntohs(ip->ip_len) - i);
    313       1.1   rmind 		}
    314       1.1   rmind 	}
    315       1.1   rmind 
    316       1.1   rmind 	/*
    317       1.1   rmind 	 * While we overlap succeeding segments trim them or, if they are
    318       1.1   rmind 	 * completely covered, dequeue them.
    319       1.1   rmind 	 */
    320       1.7   rmind 	while (q != NULL) {
    321       1.7   rmind 		size_t end;
    322       1.7   rmind 
    323       1.7   rmind 		qip = q->ipqe_ip;
    324       1.7   rmind 		end = ntohs(ip->ip_off) + ntohs(ip->ip_len);
    325       1.7   rmind 		if (end <= ntohs(qip->ip_off)) {
    326       1.7   rmind 			break;
    327       1.7   rmind 		}
    328       1.7   rmind 		i = end - ntohs(qip->ip_off);
    329       1.7   rmind 		if (i < ntohs(qip->ip_len)) {
    330       1.7   rmind 			qip->ip_len = htons(ntohs(qip->ip_len) - i);
    331       1.7   rmind 			qip->ip_off = htons(ntohs(qip->ip_off) + i);
    332       1.1   rmind 			m_adj(q->ipqe_m, i);
    333       1.1   rmind 			break;
    334       1.1   rmind 		}
    335       1.1   rmind 		nq = TAILQ_NEXT(q, ipqe_q);
    336       1.1   rmind 		m_freem(q->ipqe_m);
    337       1.1   rmind 		TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q);
    338       1.4   rmind 		pool_cache_put(ipfren_cache, q);
    339       1.1   rmind 		fp->ipq_nfrags--;
    340       1.1   rmind 		ip_nfrags--;
    341       1.7   rmind 		q = nq;
    342       1.1   rmind 	}
    343       1.1   rmind 
    344       1.1   rmind insert:
    345       1.1   rmind 	/*
    346       1.1   rmind 	 * Stick new segment in its place; check for complete reassembly.
    347       1.1   rmind 	 */
    348       1.1   rmind 	if (p == NULL) {
    349       1.1   rmind 		TAILQ_INSERT_HEAD(&fp->ipq_fragq, ipqe, ipqe_q);
    350       1.1   rmind 	} else {
    351       1.1   rmind 		TAILQ_INSERT_AFTER(&fp->ipq_fragq, p, ipqe, ipqe_q);
    352       1.1   rmind 	}
    353       1.1   rmind 	next = 0;
    354       1.7   rmind 	TAILQ_FOREACH(q, &fp->ipq_fragq, ipqe_q) {
    355       1.7   rmind 		qip = q->ipqe_ip;
    356       1.7   rmind 		if (ntohs(qip->ip_off) != next) {
    357       1.4   rmind 			mutex_exit(&ipfr_lock);
    358       1.1   rmind 			return NULL;
    359       1.1   rmind 		}
    360       1.7   rmind 		next += ntohs(qip->ip_len);
    361       1.1   rmind 	}
    362       1.7   rmind 	p = TAILQ_LAST(&fp->ipq_fragq, ipfr_qent_head);
    363       1.1   rmind 	if (p->ipqe_mff) {
    364       1.4   rmind 		mutex_exit(&ipfr_lock);
    365       1.1   rmind 		return NULL;
    366       1.1   rmind 	}
    367       1.7   rmind 
    368       1.1   rmind 	/*
    369       1.4   rmind 	 * Reassembly is complete.  Check for a bogus message size.
    370       1.1   rmind 	 */
    371       1.1   rmind 	q = TAILQ_FIRST(&fp->ipq_fragq);
    372       1.1   rmind 	ip = q->ipqe_ip;
    373       1.1   rmind 	if ((next + (ip->ip_hl << 2)) > IP_MAXPACKET) {
    374       1.1   rmind 		IP_STATINC(IP_STAT_TOOLONG);
    375       1.1   rmind 		ip_freef(fp);
    376       1.4   rmind 		mutex_exit(&ipfr_lock);
    377       1.1   rmind 		return NULL;
    378       1.1   rmind 	}
    379       1.4   rmind 	LIST_REMOVE(fp, ipq_q);
    380       1.4   rmind 	ip_nfrags -= fp->ipq_nfrags;
    381       1.4   rmind 	ip_nfragpackets--;
    382       1.4   rmind 	mutex_exit(&ipfr_lock);
    383       1.4   rmind 
    384       1.4   rmind 	/* Concatenate all fragments. */
    385       1.1   rmind 	m = q->ipqe_m;
    386       1.1   rmind 	t = m->m_next;
    387       1.1   rmind 	m->m_next = NULL;
    388       1.1   rmind 	m_cat(m, t);
    389       1.1   rmind 	nq = TAILQ_NEXT(q, ipqe_q);
    390       1.4   rmind 	pool_cache_put(ipfren_cache, q);
    391       1.4   rmind 
    392       1.1   rmind 	for (q = nq; q != NULL; q = nq) {
    393       1.1   rmind 		t = q->ipqe_m;
    394       1.1   rmind 		nq = TAILQ_NEXT(q, ipqe_q);
    395       1.4   rmind 		pool_cache_put(ipfren_cache, q);
    396  1.9.12.1  martin 		m_pkthdr_remove(t);
    397       1.1   rmind 		m_cat(m, t);
    398       1.1   rmind 	}
    399       1.1   rmind 
    400       1.1   rmind 	/*
    401       1.1   rmind 	 * Create header for new packet by modifying header of first
    402       1.1   rmind 	 * packet.  Dequeue and discard fragment reassembly header.  Make
    403       1.1   rmind 	 * header visible.
    404       1.1   rmind 	 */
    405       1.2   rmind 	ip->ip_len = htons((ip->ip_hl << 2) + next);
    406       1.1   rmind 	ip->ip_src = fp->ipq_src;
    407       1.1   rmind 	ip->ip_dst = fp->ipq_dst;
    408       1.5   enami 	free(fp, M_FTABLE);
    409       1.2   rmind 
    410       1.1   rmind 	m->m_len += (ip->ip_hl << 2);
    411       1.1   rmind 	m->m_data -= (ip->ip_hl << 2);
    412       1.4   rmind 
    413       1.4   rmind 	/* Fix up mbuf.  XXX This should be done elsewhere. */
    414  1.9.12.1  martin 	{
    415  1.9.12.1  martin 		KASSERT(m->m_flags & M_PKTHDR);
    416       1.1   rmind 		int plen = 0;
    417       1.1   rmind 		for (t = m; t; t = t->m_next) {
    418       1.1   rmind 			plen += t->m_len;
    419       1.1   rmind 		}
    420       1.1   rmind 		m->m_pkthdr.len = plen;
    421       1.1   rmind 		m->m_pkthdr.csum_flags = 0;
    422       1.1   rmind 	}
    423       1.1   rmind 	return m;
    424       1.1   rmind 
    425       1.1   rmind dropfrag:
    426       1.1   rmind 	if (fp != NULL) {
    427       1.1   rmind 		fp->ipq_nfrags--;
    428       1.1   rmind 	}
    429       1.1   rmind 	ip_nfrags--;
    430       1.1   rmind 	IP_STATINC(IP_STAT_FRAGDROPPED);
    431       1.4   rmind 	mutex_exit(&ipfr_lock);
    432       1.4   rmind 
    433       1.4   rmind 	pool_cache_put(ipfren_cache, ipqe);
    434       1.1   rmind 	m_freem(m);
    435       1.1   rmind 	return NULL;
    436       1.1   rmind }
    437       1.1   rmind 
    438       1.1   rmind /*
    439       1.1   rmind  * ip_freef:
    440       1.1   rmind  *
    441       1.1   rmind  *	Free a fragment reassembly header and all associated datagrams.
    442       1.1   rmind  */
    443       1.2   rmind static void
    444       1.3   rmind ip_freef(ipfr_queue_t *fp)
    445       1.1   rmind {
    446       1.4   rmind 	ipfr_qent_t *q;
    447       1.1   rmind 
    448       1.4   rmind 	KASSERT(mutex_owned(&ipfr_lock));
    449       1.1   rmind 
    450       1.4   rmind 	LIST_REMOVE(fp, ipq_q);
    451       1.4   rmind 	ip_nfrags -= fp->ipq_nfrags;
    452       1.4   rmind 	ip_nfragpackets--;
    453       1.4   rmind 
    454       1.4   rmind 	while ((q = TAILQ_FIRST(&fp->ipq_fragq)) != NULL) {
    455       1.4   rmind 		TAILQ_REMOVE(&fp->ipq_fragq, q, ipqe_q);
    456       1.1   rmind 		m_freem(q->ipqe_m);
    457       1.4   rmind 		pool_cache_put(ipfren_cache, q);
    458       1.1   rmind 	}
    459       1.1   rmind 	free(fp, M_FTABLE);
    460       1.1   rmind }
    461       1.1   rmind 
    462       1.1   rmind /*
    463       1.1   rmind  * ip_reass_ttl_decr:
    464       1.1   rmind  *
    465       1.1   rmind  *	Decrement TTL of all reasembly queue entries by `ticks'.  Count
    466       1.1   rmind  *	number of distinct fragments (as opposed to partial, fragmented
    467       1.1   rmind  *	datagrams) inthe reassembly queue.  While we  traverse the entire
    468       1.1   rmind  *	reassembly queue, compute and return the median TTL over all
    469       1.1   rmind  *	fragments.
    470       1.1   rmind  */
    471       1.1   rmind static u_int
    472       1.1   rmind ip_reass_ttl_decr(u_int ticks)
    473       1.1   rmind {
    474       1.1   rmind 	u_int nfrags, median, dropfraction, keepfraction;
    475       1.3   rmind 	ipfr_queue_t *fp, *nfp;
    476       1.1   rmind 	int i;
    477       1.1   rmind 
    478       1.1   rmind 	nfrags = 0;
    479       1.1   rmind 	memset(fragttl_histo, 0, sizeof(fragttl_histo));
    480       1.1   rmind 
    481       1.1   rmind 	for (i = 0; i < IPREASS_HASH_SIZE; i++) {
    482       1.3   rmind 		for (fp = LIST_FIRST(&ip_frags[i]); fp != NULL; fp = nfp) {
    483       1.1   rmind 			fp->ipq_ttl = ((fp->ipq_ttl <= ticks) ?
    484       1.1   rmind 			    0 : fp->ipq_ttl - ticks);
    485       1.1   rmind 			nfp = LIST_NEXT(fp, ipq_q);
    486       1.1   rmind 			if (fp->ipq_ttl == 0) {
    487       1.1   rmind 				IP_STATINC(IP_STAT_FRAGTIMEOUT);
    488       1.1   rmind 				ip_freef(fp);
    489       1.1   rmind 			} else {
    490       1.1   rmind 				nfrags += fp->ipq_nfrags;
    491       1.1   rmind 				fragttl_histo[fp->ipq_ttl] += fp->ipq_nfrags;
    492       1.1   rmind 			}
    493       1.1   rmind 		}
    494       1.1   rmind 	}
    495       1.1   rmind 
    496       1.1   rmind 	KASSERT(ip_nfrags == nfrags);
    497       1.1   rmind 
    498       1.1   rmind 	/* Find median (or other drop fraction) in histogram. */
    499       1.1   rmind 	dropfraction = (ip_nfrags / 2);
    500       1.1   rmind 	keepfraction = ip_nfrags - dropfraction;
    501       1.1   rmind 	for (i = IPFRAGTTL, median = 0; i >= 0; i--) {
    502       1.1   rmind 		median += fragttl_histo[i];
    503       1.1   rmind 		if (median >= keepfraction)
    504       1.1   rmind 			break;
    505       1.1   rmind 	}
    506       1.1   rmind 
    507       1.1   rmind 	/* Return TTL of median (or other fraction). */
    508       1.1   rmind 	return (u_int)i;
    509       1.1   rmind }
    510       1.1   rmind 
    511       1.1   rmind static void
    512       1.1   rmind ip_reass_drophalf(void)
    513       1.1   rmind {
    514       1.1   rmind 	u_int median_ticks;
    515       1.1   rmind 
    516       1.4   rmind 	KASSERT(mutex_owned(&ipfr_lock));
    517       1.4   rmind 
    518       1.1   rmind 	/*
    519       1.1   rmind 	 * Compute median TTL of all fragments, and count frags
    520       1.1   rmind 	 * with that TTL or lower (roughly half of all fragments).
    521       1.1   rmind 	 */
    522       1.1   rmind 	median_ticks = ip_reass_ttl_decr(0);
    523       1.1   rmind 
    524       1.1   rmind 	/* Drop half. */
    525       1.1   rmind 	median_ticks = ip_reass_ttl_decr(median_ticks);
    526       1.1   rmind }
    527       1.1   rmind 
    528       1.1   rmind /*
    529       1.1   rmind  * ip_reass_drain: drain off all datagram fragments.  Do not acquire
    530       1.1   rmind  * softnet_lock as can be called from hardware interrupt context.
    531       1.1   rmind  */
    532       1.1   rmind void
    533       1.1   rmind ip_reass_drain(void)
    534       1.1   rmind {
    535       1.1   rmind 
    536       1.1   rmind 	/*
    537       1.1   rmind 	 * We may be called from a device's interrupt context.  If
    538       1.1   rmind 	 * the ipq is already busy, just bail out now.
    539       1.1   rmind 	 */
    540       1.4   rmind 	if (mutex_tryenter(&ipfr_lock)) {
    541       1.1   rmind 		/*
    542       1.1   rmind 		 * Drop half the total fragments now. If more mbufs are
    543       1.1   rmind 		 * needed, we will be called again soon.
    544       1.1   rmind 		 */
    545       1.1   rmind 		ip_reass_drophalf();
    546       1.4   rmind 		mutex_exit(&ipfr_lock);
    547       1.1   rmind 	}
    548       1.1   rmind }
    549       1.1   rmind 
    550       1.1   rmind /*
    551       1.1   rmind  * ip_reass_slowtimo:
    552       1.1   rmind  *
    553       1.1   rmind  *	If a timer expires on a reassembly queue, discard it.
    554       1.1   rmind  */
    555       1.1   rmind void
    556       1.1   rmind ip_reass_slowtimo(void)
    557       1.1   rmind {
    558       1.1   rmind 	static u_int dropscanidx = 0;
    559       1.1   rmind 	u_int i, median_ttl;
    560       1.1   rmind 
    561       1.4   rmind 	mutex_enter(&ipfr_lock);
    562       1.1   rmind 
    563       1.1   rmind 	/* Age TTL of all fragments by 1 tick .*/
    564       1.1   rmind 	median_ttl = ip_reass_ttl_decr(1);
    565       1.1   rmind 
    566       1.1   rmind 	/* Make sure fragment limit is up-to-date. */
    567       1.1   rmind 	CHECK_NMBCLUSTER_PARAMS();
    568       1.1   rmind 
    569       1.1   rmind 	/* If we have too many fragments, drop the older half. */
    570       1.1   rmind 	if (ip_nfrags > ip_maxfrags) {
    571       1.1   rmind 		ip_reass_ttl_decr(median_ttl);
    572       1.1   rmind 	}
    573       1.1   rmind 
    574       1.1   rmind 	/*
    575       1.1   rmind 	 * If we are over the maximum number of fragmented packets (due to
    576       1.1   rmind 	 * the limit being lowered), drain off enough to get down to the
    577       1.1   rmind 	 * new limit.  Start draining from the reassembly hashqueue most
    578       1.1   rmind 	 * recently drained.
    579       1.1   rmind 	 */
    580       1.1   rmind 	if (ip_maxfragpackets < 0)
    581       1.1   rmind 		;
    582       1.1   rmind 	else {
    583       1.1   rmind 		int wrapped = 0;
    584       1.1   rmind 
    585       1.1   rmind 		i = dropscanidx;
    586       1.1   rmind 		while (ip_nfragpackets > ip_maxfragpackets && wrapped == 0) {
    587       1.3   rmind 			while (LIST_FIRST(&ip_frags[i]) != NULL) {
    588       1.3   rmind 				ip_freef(LIST_FIRST(&ip_frags[i]));
    589       1.1   rmind 			}
    590       1.1   rmind 			if (++i >= IPREASS_HASH_SIZE) {
    591       1.1   rmind 				i = 0;
    592       1.1   rmind 			}
    593       1.1   rmind 			/*
    594       1.1   rmind 			 * Do not scan forever even if fragment counters are
    595       1.1   rmind 			 * wrong: stop after scanning entire reassembly queue.
    596       1.1   rmind 			 */
    597       1.1   rmind 			if (i == dropscanidx) {
    598       1.1   rmind 				wrapped = 1;
    599       1.1   rmind 			}
    600       1.1   rmind 		}
    601       1.1   rmind 		dropscanidx = i;
    602       1.1   rmind 	}
    603       1.4   rmind 	mutex_exit(&ipfr_lock);
    604       1.1   rmind }
    605       1.2   rmind 
    606       1.2   rmind /*
    607       1.2   rmind  * ip_reass_packet: generic routine to perform IP reassembly.
    608       1.2   rmind  *
    609       1.2   rmind  * => Passed fragment should have IP_MF flag and/or offset set.
    610       1.2   rmind  * => Fragment should not have other than IP_MF flags set.
    611       1.2   rmind  *
    612       1.7   rmind  * => Returns 0 on success or error otherwise.
    613       1.7   rmind  * => On complete, m0 represents a constructed final packet.
    614       1.2   rmind  */
    615       1.2   rmind int
    616       1.7   rmind ip_reass_packet(struct mbuf **m0, struct ip *ip)
    617       1.2   rmind {
    618       1.7   rmind 	const int hlen = ip->ip_hl << 2;
    619       1.7   rmind 	const int len = ntohs(ip->ip_len);
    620       1.7   rmind 	struct mbuf *m = *m0;
    621       1.3   rmind 	ipfr_queue_t *fp;
    622       1.3   rmind 	ipfr_qent_t *ipqe;
    623       1.7   rmind 	u_int hash, off, flen;
    624       1.7   rmind 	bool mff;
    625       1.7   rmind 
    626       1.7   rmind 	/*
    627       1.7   rmind 	 * Prevent TCP blind data attacks by not allowing non-initial
    628       1.7   rmind 	 * fragments to start at less than 68 bytes (minimal fragment
    629       1.7   rmind 	 * size) and making sure the first fragment is at least 68
    630       1.7   rmind 	 * bytes.
    631       1.7   rmind 	 */
    632       1.7   rmind 	off = (ntohs(ip->ip_off) & IP_OFFMASK) << 3;
    633       1.7   rmind 	if ((off > 0 ? off + hlen : len) < IP_MINFRAGSIZE - 1) {
    634       1.7   rmind 		IP_STATINC(IP_STAT_BADFRAGS);
    635       1.7   rmind 		return EINVAL;
    636       1.7   rmind 	}
    637       1.7   rmind 
    638       1.7   rmind 	/*
    639       1.7   rmind 	 * Fragment length and MF flag.  Make sure that fragments have
    640       1.7   rmind 	 * a data length which is non-zero and multiple of 8 bytes.
    641       1.7   rmind 	 */
    642       1.7   rmind 	flen = ntohs(ip->ip_len) - hlen;
    643       1.7   rmind 	mff = (ip->ip_off & htons(IP_MF)) != 0;
    644       1.7   rmind 	if (mff && (flen == 0 || (flen & 0x7) != 0)) {
    645       1.7   rmind 		IP_STATINC(IP_STAT_BADFRAGS);
    646       1.7   rmind 		return EINVAL;
    647       1.7   rmind 	}
    648       1.7   rmind 
    649       1.7   rmind 	/*
    650       1.7   rmind 	 * Adjust total IP length to not reflect header and convert
    651       1.7   rmind 	 * offset of this to bytes.  XXX: clobbers struct ip.
    652       1.7   rmind 	 */
    653       1.7   rmind 	ip->ip_len = htons(flen);
    654       1.7   rmind 	ip->ip_off = htons(off);
    655       1.2   rmind 
    656       1.2   rmind 	/* Look for queue of fragments of this datagram. */
    657       1.4   rmind 	mutex_enter(&ipfr_lock);
    658       1.3   rmind 	hash = IPREASS_HASH(ip->ip_src.s_addr, ip->ip_id);
    659       1.3   rmind 	LIST_FOREACH(fp, &ip_frags[hash], ipq_q) {
    660       1.3   rmind 		if (ip->ip_id != fp->ipq_id)
    661       1.3   rmind 			continue;
    662       1.3   rmind 		if (!in_hosteq(ip->ip_src, fp->ipq_src))
    663       1.3   rmind 			continue;
    664       1.3   rmind 		if (!in_hosteq(ip->ip_dst, fp->ipq_dst))
    665       1.3   rmind 			continue;
    666       1.3   rmind 		if (ip->ip_p != fp->ipq_p)
    667       1.3   rmind 			continue;
    668       1.3   rmind 		break;
    669       1.3   rmind 	}
    670       1.2   rmind 
    671       1.2   rmind 	/* Make sure that TOS matches previous fragments. */
    672       1.2   rmind 	if (fp && fp->ipq_tos != ip->ip_tos) {
    673       1.2   rmind 		IP_STATINC(IP_STAT_BADFRAGS);
    674       1.4   rmind 		mutex_exit(&ipfr_lock);
    675       1.2   rmind 		return EINVAL;
    676       1.2   rmind 	}
    677       1.2   rmind 
    678       1.2   rmind 	/*
    679       1.2   rmind 	 * Create new entry and attempt to reassembly.
    680       1.2   rmind 	 */
    681       1.2   rmind 	IP_STATINC(IP_STAT_FRAGMENTS);
    682       1.4   rmind 	ipqe = pool_cache_get(ipfren_cache, PR_NOWAIT);
    683       1.2   rmind 	if (ipqe == NULL) {
    684       1.2   rmind 		IP_STATINC(IP_STAT_RCVMEMDROP);
    685       1.4   rmind 		mutex_exit(&ipfr_lock);
    686       1.2   rmind 		return ENOMEM;
    687       1.2   rmind 	}
    688       1.2   rmind 	ipqe->ipqe_mff = mff;
    689       1.2   rmind 	ipqe->ipqe_m = m;
    690       1.2   rmind 	ipqe->ipqe_ip = ip;
    691       1.2   rmind 
    692       1.7   rmind 	*m0 = ip_reass(ipqe, fp, hash);
    693       1.7   rmind 	if (*m0) {
    694       1.7   rmind 		/* Note that finally reassembled. */
    695       1.2   rmind 		IP_STATINC(IP_STAT_REASSEMBLED);
    696       1.2   rmind 	}
    697       1.2   rmind 	return 0;
    698       1.2   rmind }
    699