VirtualBox

source: vbox/trunk/src/VBox/Devices/Network/slirp/ip_output.c@ 49482

Last change on this file since 49482 was 44528, checked in by vboxsync, 12 years ago

header (C) fixes

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 12.1 KB
Line 
1/* $Id: ip_output.c 44528 2013-02-04 14:27:54Z vboxsync $ */
2/** @file
3 * NAT - IP output.
4 */
5
6/*
7 * Copyright (C) 2006-2011 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18/*
19 * This code is based on:
20 *
21 * Copyright (c) 1982, 1986, 1988, 1990, 1993
22 * The Regents of the University of California. All rights reserved.
23 *
24 * Redistribution and use in source and binary forms, with or without
25 * modification, are permitted provided that the following conditions
26 * are met:
27 * 1. Redistributions of source code must retain the above copyright
28 * notice, this list of conditions and the following disclaimer.
29 * 2. Redistributions in binary form must reproduce the above copyright
30 * notice, this list of conditions and the following disclaimer in the
31 * documentation and/or other materials provided with the distribution.
32 * 3. All advertising materials mentioning features or use of this software
33 * must display the following acknowledgement:
34 * This product includes software developed by the University of
35 * California, Berkeley and its contributors.
36 * 4. Neither the name of the University nor the names of its contributors
37 * may be used to endorse or promote products derived from this software
38 * without specific prior written permission.
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * @(#)ip_output.c 8.3 (Berkeley) 1/21/94
53 * ip_output.c,v 1.9 1994/11/16 10:17:10 jkh Exp
54 */
55
56/*
57 * Changes and additions relating to SLiRP are
58 * Copyright (c) 1995 Danny Gasparovski.
59 *
60 * Please read the file COPYRIGHT for the
61 * terms and conditions of the copyright.
62 */
63
64#include <slirp.h>
65#include "alias.h"
66
67static const uint8_t broadcast_ethaddr[6] =
68{
69 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
70};
71
72static int rt_lookup_in_cache(PNATState pData, uint32_t dst, uint8_t *ether)
73{
74 int rc;
75 LogFlowFunc(("ENTER: dst:%RTnaipv4, ether:%RTmac\n", dst, ether));
76 if (dst == INADDR_BROADCAST)
77 {
78 memcpy(ether, broadcast_ethaddr, ETH_ALEN);
79 LogFlowFunc(("LEAVE: VINF_SUCCESS\n"));
80 return VINF_SUCCESS;
81 }
82
83 rc = slirp_arp_lookup_ether_by_ip(pData, dst, ether);
84 if (RT_SUCCESS(rc))
85 {
86 LogFlowFunc(("LEAVE: %Rrc\n", rc));
87 return rc;
88 }
89
90 rc = bootp_cache_lookup_ether_by_ip(pData, dst, ether);
91 if (RT_SUCCESS(rc))
92 {
93 LogFlowFunc(("LEAVE: %Rrc\n", rc));
94 return rc;
95 }
96 /*
97 * no chance to send this packet, sorry, we will request ether address via ARP
98 */
99 slirp_arp_who_has(pData, dst);
100 LogFlowFunc(("LEAVE: VERR_NOT_FOUND\n"));
101 return VERR_NOT_FOUND;
102}
103
104/*
105 * IP output. The packet in mbuf chain m contains a skeletal IP
106 * header (with len, off, ttl, proto, tos, src, dst).
107 * The mbuf chain containing the packet will be freed.
108 * The mbuf opt, if present, will not be freed.
109 */
110int
111ip_output(PNATState pData, struct socket *so, struct mbuf *m0)
112{
113 return ip_output0(pData, so, m0, 0);
114}
115
116/* This function will free m0! */
117int
118ip_output0(PNATState pData, struct socket *so, struct mbuf *m0, int urg)
119{
120 register struct ip *ip;
121 register struct mbuf *m = m0;
122 register int hlen = sizeof(struct ip);
123 int len, off, error = 0;
124 struct ethhdr *eh = NULL;
125 uint8_t eth_dst[ETH_ALEN];
126 int rc = 1;
127
128 STAM_PROFILE_START(&pData->StatIP_output, a);
129
130#ifdef LOG_ENABLED
131 LogFlowFunc(("ip_output: so = %R[natsock], m0 = %lx\n", so, (long)m0));
132#else
133 NOREF(so);
134#endif
135
136 M_ASSERTPKTHDR(m);
137 Assert(m->m_pkthdr.header);
138
139#if 0 /* We do no options */
140 if (opt)
141 {
142 m = ip_insertoptions(m, opt, &len);
143 hlen = len;
144 }
145#endif
146 ip = mtod(m, struct ip *);
147 LogFunc(("ip(src:%RTnaipv4, dst:%RTnaipv4)\n", ip->ip_src, ip->ip_dst));
148 /*
149 * Fill in IP header.
150 */
151 ip->ip_v = IPVERSION;
152 ip->ip_off &= IP_DF;
153 ip->ip_id = RT_H2N_U16(ip_currid++);
154 ip->ip_hl = hlen >> 2;
155 ipstat.ips_localout++;
156
157 /* Current TCP/IP stack hasn't routing information at
158 * all so we need to calculate destination ethernet address
159 */
160 rc = rt_lookup_in_cache(pData, ip->ip_dst.s_addr, eth_dst);
161 if (RT_FAILURE(rc))
162 goto exit_drop_package;
163
164 eh = (struct ethhdr *)(m->m_data - ETH_HLEN);
165 /*
166 * If small enough for interface, can just send directly.
167 */
168 if ((u_int16_t)ip->ip_len <= if_mtu)
169 {
170 ip->ip_len = RT_H2N_U16((u_int16_t)ip->ip_len);
171 ip->ip_off = RT_H2N_U16((u_int16_t)ip->ip_off);
172 ip->ip_sum = 0;
173 ip->ip_sum = cksum(m, hlen);
174
175 if (!(m->m_flags & M_SKIP_FIREWALL)){
176 struct m_tag *t;
177 STAM_PROFILE_START(&pData->StatALIAS_output, b);
178 if ((t = m_tag_find(m, PACKET_TAG_ALIAS, NULL)) != 0)
179 rc = LibAliasOut((struct libalias *)&t[1], mtod(m, char *),
180 m_length(m, NULL));
181 else
182 rc = LibAliasOut(pData->proxy_alias, mtod(m, char *),
183 m_length(m, NULL));
184
185 if (rc == PKT_ALIAS_IGNORED)
186 {
187 Log(("NAT: packet was droppped\n"));
188 goto exit_drop_package;
189 }
190 STAM_PROFILE_STOP(&pData->StatALIAS_output, b);
191 }
192 else
193 m->m_flags &= ~M_SKIP_FIREWALL;
194
195 memcpy(eh->h_source, eth_dst, ETH_ALEN);
196
197 LogFlowFunc(("ip(ip_src:%RTnaipv4, ip_dst:%RTnaipv4)\n",
198 ip->ip_src, ip->ip_dst));
199 if_encap(pData, ETH_P_IP, m, urg? ETH_ENCAP_URG : 0);
200 goto done;
201 }
202
203 /*
204 * Too large for interface; fragment if possible.
205 * Must be able to put at least 8 bytes per fragment.
206 */
207 if (ip->ip_off & IP_DF)
208 {
209 error = -1;
210 ipstat.ips_cantfrag++;
211 goto exit_drop_package;
212 }
213
214 len = (if_mtu - hlen) &~ 7; /* ip databytes per packet */
215 if (len < 8)
216 {
217 error = -1;
218 goto exit_drop_package;
219 }
220
221 {
222 int mhlen, firstlen = len;
223 struct mbuf **mnext = &m->m_nextpkt;
224 char *buf; /* intermediate buffer we'll use for a copy of the original packet */
225 /*
226 * Loop through length of segment after first fragment,
227 * make new header and copy data of each part and link onto chain.
228 */
229 m0 = m;
230 mhlen = ip->ip_hl << 2;
231 Log(("NAT:ip:frag: mhlen = %d\n", mhlen));
232 for (off = hlen + len; off < (u_int16_t)ip->ip_len; off += len)
233 {
234 register struct ip *mhip;
235 m = m_getjcl(pData, M_NOWAIT, MT_HEADER , M_PKTHDR, slirp_size(pData));
236 if (m == 0)
237 {
238 error = -1;
239 ipstat.ips_odropped++;
240 goto send_or_free;
241 }
242 m->m_data += if_maxlinkhdr;
243 mhip = mtod(m, struct ip *);
244 *mhip = *ip;
245 m->m_pkthdr.header = mtod(m, void *);
246 /* we've calculated eth_dst for first packet */
247#if 0 /* No options */
248 if (hlen > sizeof (struct ip))
249 {
250 mhlen = ip_optcopy(ip, mhip) + sizeof (struct ip);
251 mhip->ip_hl = mhlen >> 2;
252 }
253#endif
254 m->m_len = mhlen;
255 mhip->ip_off = ((off - mhlen) >> 3) + (ip->ip_off & ~IP_MF);
256 if (ip->ip_off & IP_MF)
257 mhip->ip_off |= IP_MF;
258 if (off + len >= (u_int16_t)ip->ip_len)
259 len = (u_int16_t)ip->ip_len - off;
260 else
261 mhip->ip_off |= IP_MF;
262 mhip->ip_len = RT_H2N_U16((u_int16_t)(len + mhlen));
263
264 buf = RTMemAlloc(len);
265 Log(("NAT:ip:frag: alloc = %d\n", len));
266 m_copydata(m0, off, len, buf); /* copy to buffer */
267 Log(("NAT:ip:frag: m_copydata(m0 = %p,off = %d, len = %d,)\n", m0, off, len));
268
269 m->m_data += mhlen;
270 m->m_len -= mhlen;
271 m_copyback(pData, m, 0, len, buf); /* copy from buffer */
272 Log(("NAT:ip:frag: m_copyback(m = %p,, len = %d,)\n", m, len));
273 m->m_data -= mhlen;
274 m->m_len += mhlen;
275 RTMemFree(buf);
276 Assert((m->m_len == (mhlen + len)));
277
278 mhip->ip_off = RT_H2N_U16((u_int16_t)(mhip->ip_off));
279 mhip->ip_sum = 0;
280 mhip->ip_sum = cksum(m, mhlen);
281 *mnext = m;
282 mnext = &m->m_nextpkt;
283 ipstat.ips_ofragments++;
284 }
285 /*
286 * Update first fragment by trimming what's been copied out
287 * and updating header, then send each fragment (in order).
288 *
289 * note: m_adj do all required releases for chained mbufs.
290 */
291 m = m0;
292 m_adj(m, mhlen + firstlen - (u_int16_t)ip->ip_len);
293 Log(("NAT:ip:frag: m_adj(m(m_len:%d) = %p, len = %d)\n", m->m_len, m, mhlen + firstlen - (u_int16_t)ip->ip_len));
294 ip->ip_len = RT_H2N_U16((u_int16_t)mhlen + firstlen);
295 ip->ip_off = RT_H2N_U16((u_int16_t)(ip->ip_off | IP_MF));
296 ip->ip_sum = 0;
297 ip->ip_sum = cksum(m, mhlen);
298
299send_or_free:
300 if (!(m->m_flags & M_SKIP_FIREWALL)){
301 /* @todo: We can't alias all fragments because the way libalias processing
302 * the fragments brake the sequence. libalias put alias_address to the source
303 * address of IP header of fragment, while IP header of the first packet is
304 * is unmodified. That confuses guest's TCP/IP stack and guest drop the sequence.
305 * Here we're letting libalias to process the first packet and send the rest as is,
306 * it's exactly the way in of packet are processing in proxyonly way.
307 * Here we need investigate what should be done to avoid such behavior and find right
308 * solution.
309 */
310 struct m_tag *t;
311 int rcLa;
312 if ((t = m_tag_find(m, PACKET_TAG_ALIAS, NULL)) != 0)
313 rcLa = LibAliasOut((struct libalias *)&t[1], mtod(m, char *), m->m_len);
314 else
315 rcLa = LibAliasOut(pData->proxy_alias, mtod(m, char *), m->m_len);
316
317 if (rcLa == PKT_ALIAS_IGNORED)
318 {
319 Log(("NAT: packet was droppped\n"));
320 goto exit_drop_package;
321 }
322 Log2(("NAT: LibAlias return %d\n", rcLa));
323 }
324 else
325 m->m_flags &= ~M_SKIP_FIREWALL;
326 for (m = m0; m; m = m0)
327 {
328 m0 = m->m_nextpkt;
329 m->m_nextpkt = 0;
330 if (error == 0)
331 {
332 m->m_data -= ETH_HLEN;
333 eh = mtod(m, struct ethhdr *);
334 m->m_data += ETH_HLEN;
335 memcpy(eh->h_source, eth_dst, ETH_ALEN);
336
337 Log(("NAT:ip:frag: if_encap(,,m(m_len = %d) = %p,0)\n", m->m_len, m));
338 if_encap(pData, ETH_P_IP, m, 0);
339 }
340 else
341 m_freem(pData, m);
342 }
343
344 if (error == 0)
345 ipstat.ips_fragmented++;
346 }
347
348done:
349 STAM_PROFILE_STOP(&pData->StatIP_output, a);
350 LogFlowFunc(("LEAVE: %d\n", error));
351 return error;
352
353exit_drop_package:
354 m_freem(pData, m0);
355 STAM_PROFILE_STOP(&pData->StatIP_output, a);
356 LogFlowFunc(("LEAVE: %d\n", error));
357 return error;
358}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette