You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2999 lines
85 KiB
2999 lines
85 KiB
/*++
|
|
|
|
Copyright (c) 1997 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
tcpip\ip\mcastfwd.c
|
|
|
|
Abstract:
|
|
|
|
The actual multicast forwarding code
|
|
|
|
Author:
|
|
|
|
Amritansh Raghav
|
|
|
|
Revision History:
|
|
|
|
AmritanR Created
|
|
|
|
Notes:
|
|
|
|
--*/
|
|
|
|
|
|
#include "precomp.h"
|
|
|
|
#if IPMCAST
|
|
#define __FILE_SIG__ FWD_SIG
|
|
|
|
#include "ipmcast.h"
|
|
#include "ipmcstxt.h"
|
|
#include "mcastmfe.h"
|
|
#include "tcpipbuf.h"
|
|
#include "info.h"
|
|
|
|
uchar
|
|
ParseRcvdOptions(
|
|
IPOptInfo *,
|
|
OptIndex *
|
|
);
|
|
|
|
IPHeader *
|
|
GetFWPacket(
|
|
PNDIS_PACKET *Packet
|
|
);
|
|
|
|
void
|
|
FreeFWPacket(
|
|
PNDIS_PACKET Packet
|
|
);
|
|
|
|
UINT
|
|
GrowFWBuffer(
|
|
VOID
|
|
);
|
|
|
|
IP_STATUS
|
|
IPFragment(
|
|
Interface *DestIF,
|
|
uint MTU,
|
|
IPAddr FirstHop,
|
|
PNDIS_PACKET Packet,
|
|
IPHeader *Header,
|
|
PNDIS_BUFFER Buffer,
|
|
uint DataSize,
|
|
uchar *Options,
|
|
uint OptionSize,
|
|
int *SentCount,
|
|
BOOLEAN bDontLoopback,
|
|
void *ArpCtxt
|
|
);
|
|
|
|
IPHeader *
|
|
GetIPHeader(
|
|
PNDIS_PACKET *PacketPtr
|
|
);
|
|
|
|
IP_STATUS
|
|
SendIPPacket(
|
|
Interface *IF,
|
|
IPAddr FirstHop,
|
|
PNDIS_PACKET Packet,
|
|
PNDIS_BUFFER Buffer,
|
|
IPHeader *Header,
|
|
uchar *Options,
|
|
uint OptionSize,
|
|
BOOLEAN IPSeced,
|
|
void *ArpCtxt,
|
|
BOOLEAN DontFreePacket
|
|
);
|
|
|
|
void
|
|
FWSendComplete(
|
|
void *SendContext,
|
|
PNDIS_BUFFER Buffer,
|
|
IP_STATUS SendStatus
|
|
);
|
|
|
|
|
|
uchar
|
|
UpdateOptions(
|
|
uchar *Options,
|
|
OptIndex *Index,
|
|
IPAddr Address
|
|
);
|
|
|
|
int
|
|
ReferenceBuffer(
|
|
BufferReference *BR, int Count
|
|
);
|
|
|
|
|
|
EXTERNAL_LOCK(FWBufFreeLock);
|
|
|
|
extern PNDIS_BUFFER FWBufFree;
|
|
extern NDIS_HANDLE BufferPool;
|
|
|
|
//
|
|
// A quick way of getting to the flags.
|
|
//
|
|
|
|
#define PCFLAGS pc_common.pc_flags
|
|
#define FCFLAGS fc_pc.PCFLAGS
|
|
|
|
NDIS_STATUS
|
|
AllocateCopyBuffers(
|
|
IN PNDIS_PACKET pnpPacket,
|
|
IN ULONG ulDataLength,
|
|
OUT PNDIS_BUFFER *ppnbBuffer,
|
|
OUT PULONG pulNumBufs
|
|
);
|
|
|
|
NTSTATUS
|
|
IPMForward(
|
|
PNDIS_PACKET pnpPacket,
|
|
PSOURCE pSource,
|
|
BOOLEAN bSendFromQueue
|
|
);
|
|
|
|
VOID
|
|
IPMForwardAfterTD(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
PNDIS_PACKET pnpPacket,
|
|
UINT uiBytesCopied
|
|
);
|
|
|
|
BOOLEAN
|
|
IPMForwardAfterRcv(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
IPHeader UNALIGNED *pHeader,
|
|
ULONG ulHeaderLength,
|
|
PVOID pvData,
|
|
ULONG ulBufferLength,
|
|
NDIS_HANDLE LContext1,
|
|
UINT LContext2,
|
|
BYTE byDestType,
|
|
LinkEntry *pLink
|
|
);
|
|
|
|
BOOLEAN
|
|
IPMForwardAfterRcvPkt(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
IPHeader UNALIGNED *pHeader,
|
|
ULONG ulHeaderLength,
|
|
PVOID pvData,
|
|
ULONG ulBufferLength,
|
|
NDIS_HANDLE LContext1,
|
|
UINT LContext2,
|
|
BYTE byDestType,
|
|
UINT uiMacHeaderSize,
|
|
PNDIS_BUFFER pNdisBuffer,
|
|
uint *pClientCnt,
|
|
LinkEntry *pLink
|
|
);
|
|
|
|
NDIS_STATUS
|
|
__inline
|
|
ProcessOptions(
|
|
FWContext *pFWC,
|
|
ULONG ulHeaderLength,
|
|
IPHeader UNALIGNED *pHeader
|
|
);
|
|
|
|
//
|
|
// VOID
|
|
// LinkHeaderAndData(
|
|
// PNDIS_PACKET _pPacket,
|
|
// FWContext *_pFWC,
|
|
// PBYTE _pOptions,
|
|
// PNDIS_BUFFER _pOptBuff
|
|
// )
|
|
//
|
|
// This routine links up the header, options (if any) and the data
|
|
// portions of an IP Packet.
|
|
// It takes an NDIS_PACKET, which has the IP data portion in NDIS_BUFFERs
|
|
// linked to it, as its input. The FWContext for the packet must
|
|
// have the header, header buffer and options set up.
|
|
// It adds the options up front and then adds the header before that
|
|
//
|
|
|
|
#define UnlinkDataFromPacket(_pPacket, _pFWC) \
|
|
{ \
|
|
PNDIS_BUFFER _pDataBuff, _pHeaderBuff; \
|
|
PVOID _pvVirtualAddress; \
|
|
RtAssert(_pFWC == (FWContext *)_pPacket->ProtocolReserved); \
|
|
_pDataBuff = _pPacket->Private.Head; \
|
|
_pHeaderBuff = _pFWC->fc_hndisbuff; \
|
|
_pPacket->Private.Head = _pHeaderBuff; \
|
|
_pPacket->Private.Tail = _pHeaderBuff; \
|
|
NDIS_BUFFER_LINKAGE(_pHeaderBuff) = NULL; \
|
|
_pPacket->Private.TotalLength = sizeof(IPHeader); \
|
|
_pPacket->Private.Count = 1; \
|
|
_pvVirtualAddress = NdisBufferVirtualAddress(_pHeaderBuff); \
|
|
_pPacket->Private.PhysicalCount = \
|
|
ADDRESS_AND_SIZE_TO_SPAN_PAGES(_pvVirtualAddress, \
|
|
sizeof(IPHeader)); \
|
|
}
|
|
|
|
//
|
|
// Code to dump the header of a packet. For debug purposes
|
|
//
|
|
|
|
#define DumpIpHeader(s,e,p) \
|
|
Trace(s,e, \
|
|
("Src %d.%d.%d.%d Dest %d.%d.%d.%d\n", \
|
|
PRINT_IPADDR((p)->iph_src), \
|
|
PRINT_IPADDR((p)->iph_dest))); \
|
|
Trace(s,e, \
|
|
("HdrLen %d Total Len %d\n", \
|
|
((((p)->iph_verlen)&0x0f)<<2), \
|
|
net_short((p)->iph_length))); \
|
|
Trace(s,e, \
|
|
("TTL %d XSum %x\n",(p)->iph_ttl, (p)->iph_xsum))
|
|
|
|
//
|
|
// Since this is used both in IPMForwardAfterRcv and IPMForwardAfterRcvPkt,
|
|
// we put the code here so bugs can be fixed in one place
|
|
//
|
|
|
|
#if MREF_DEBUG
|
|
|
|
#define InitForwardContext() \
|
|
{ \
|
|
pFWC = (FWContext *)pnpNewPacket->ProtocolReserved; \
|
|
RtAssert(pFWC->fc_buffhead is NULL); \
|
|
RtAssert(pFWC->fc_hbuff is pNewHeader); \
|
|
RtAssert(pFWC->fc_optlength is 0); \
|
|
RtAssert(pFWC->fc_options is NULL); \
|
|
RtAssert(!(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS)); \
|
|
RtAssert(pFWC->FCFLAGS & PACKET_FLAG_FW); \
|
|
RtAssert(!(pFWC->FCFLAGS & PACKET_FLAG_MFWD)); \
|
|
pFWC->FCFLAGS |= PACKET_FLAG_MFWD; \
|
|
pFWC->fc_options = NULL; \
|
|
pFWC->fc_optlength = 0; \
|
|
pFWC->fc_if = NULL; \
|
|
pFWC->fc_mtu = 0; \
|
|
pFWC->fc_srcnte = pPrimarySrcNte; \
|
|
pFWC->fc_nexthop = 0; \
|
|
pFWC->fc_sos = DisableSendOnSource; \
|
|
pFWC->fc_dtype = DEST_REM_MCAST; \
|
|
pFWC->fc_pc.pc_br = NULL; \
|
|
if(pLink) { CTEInterlockedIncrementLong(&(pLink->link_refcount)); } \
|
|
pFWC->fc_iflink = pLink; \
|
|
}
|
|
|
|
#else
|
|
|
|
#define InitForwardContext() \
|
|
{ \
|
|
pFWC = (FWContext *)pnpNewPacket->ProtocolReserved; \
|
|
RtAssert(pFWC->fc_buffhead is NULL); \
|
|
RtAssert(pFWC->fc_hbuff is pNewHeader); \
|
|
RtAssert(pFWC->fc_optlength is 0); \
|
|
RtAssert(pFWC->fc_options is NULL); \
|
|
RtAssert(!(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS)); \
|
|
RtAssert(pFWC->FCFLAGS & PACKET_FLAG_FW); \
|
|
pFWC->fc_options = NULL; \
|
|
pFWC->fc_optlength = 0; \
|
|
pFWC->fc_if = NULL; \
|
|
pFWC->fc_mtu = 0; \
|
|
pFWC->fc_srcnte = pPrimarySrcNte; \
|
|
pFWC->fc_nexthop = 0; \
|
|
pFWC->fc_sos = DisableSendOnSource; \
|
|
pFWC->fc_dtype = DEST_REM_MCAST; \
|
|
pFWC->fc_pc.pc_br = NULL; \
|
|
if(pLink) { CTEInterlockedIncrementLong(&(pLink->link_refcount)); } \
|
|
pFWC->fc_iflink = pLink; \
|
|
}
|
|
|
|
#endif
|
|
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
|
|
_inline
|
|
VOID
|
|
ProcessWrongIfUpcall(Interface * pIf, PSOURCE pSrc, LinkEntry * pLink,
|
|
IPHeader UNALIGNED * pHdr, ULONG ulHdrLen,
|
|
PUCHAR pvOpt, ULONG ulOptLen, PVOID pvData,
|
|
ULONG ulDataLen)
|
|
{
|
|
if(pIf->if_mcastflags & IPMCAST_IF_WRONG_IF)
|
|
{
|
|
PEXCEPT_IF pTempIf;
|
|
BOOLEAN bWrong = TRUE;
|
|
LONGLONG llCurrentTime, llTime;
|
|
|
|
KeQueryTickCount((PLARGE_INTEGER)&llCurrentTime);
|
|
llTime = llCurrentTime - pIf->if_lastupcall;
|
|
|
|
if((llCurrentTime > pIf->if_lastupcall) && (llTime < SECS_TO_TICKS(UPCALL_PERIOD))) {
|
|
|
|
bWrong = FALSE;
|
|
|
|
} else {
|
|
|
|
for(pTempIf = (pSrc)->pFirstExceptIf;
|
|
pTempIf != NULL;
|
|
pTempIf = pTempIf->pNextExceptIf)
|
|
{
|
|
if(pTempIf->dwIfIndex == (pIf)->if_index)
|
|
{
|
|
bWrong = FALSE;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if(bWrong)
|
|
{
|
|
SendWrongIfUpcall((pIf), (pLink), (pHdr), (ulHdrLen),
|
|
(pvOpt), (ulOptLen), (pvData), (ulDataLen));
|
|
}
|
|
}
|
|
}
|
|
|
|
#pragma warning(pop)
|
|
|
|
//
|
|
// Again common code, but this is too big to put as a #define.
|
|
// Make it inline for better speed
|
|
//
|
|
|
|
//
|
|
// MUST BE PAGED IN
|
|
//
|
|
|
|
#pragma alloc_text(PAGEIPMc, ProcessOptions)
|
|
|
|
NDIS_STATUS
|
|
__inline
|
|
ProcessOptions(
|
|
FWContext *pFWC,
|
|
ULONG ulHeaderLength,
|
|
IPHeader UNALIGNED *pHeader
|
|
)
|
|
{
|
|
IPOptInfo oiOptInfo;
|
|
BYTE byErrIndex;
|
|
|
|
pFWC->fc_index.oi_srtype = NO_SR;
|
|
pFWC->fc_index.oi_srindex = MAX_OPT_SIZE;
|
|
pFWC->fc_index.oi_rrindex = MAX_OPT_SIZE;
|
|
pFWC->fc_index.oi_tsindex = MAX_OPT_SIZE;
|
|
|
|
oiOptInfo.ioi_options = (uchar *)(pHeader + 1);
|
|
oiOptInfo.ioi_optlength = (BYTE)(ulHeaderLength - sizeof(IPHeader));
|
|
|
|
byErrIndex = ParseRcvdOptions(&oiOptInfo,
|
|
&pFWC->fc_index);
|
|
if(byErrIndex < MAX_OPT_SIZE)
|
|
{
|
|
return NDIS_STATUS_FAILURE;
|
|
}
|
|
|
|
pFWC->fc_options = CTEAllocMem(oiOptInfo.ioi_optlength);
|
|
|
|
if(pFWC->fc_options is NULL)
|
|
{
|
|
return NDIS_STATUS_RESOURCES;
|
|
}
|
|
|
|
// copy the options across
|
|
RtlCopyMemory( pFWC->fc_options,
|
|
oiOptInfo.ioi_options,
|
|
oiOptInfo.ioi_optlength );
|
|
|
|
pFWC->fc_optlength = oiOptInfo.ioi_optlength;
|
|
|
|
pFWC->FCFLAGS |= PACKET_FLAG_OPTIONS;
|
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
}
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////////
|
|
// //
|
|
// Routines //
|
|
// //
|
|
//////////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
// MUST BE PAGED IN
|
|
//
|
|
|
|
#pragma alloc_text(PAGEIPMc, IPMForwardAfterTD)
|
|
|
|
VOID
|
|
IPMForwardAfterTD(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
PNDIS_PACKET pnpPacket,
|
|
UINT uiBytesCopied
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This is the function called by IPTDComplete when a Transfer Data completes
|
|
and it figures out that the packet was a multicast that needed to be
|
|
forwarded
|
|
Unlike the unicast code, TD is called very early on in the forward routine
|
|
(before the main forwarding workhorse is called).
|
|
We need to patch up the NDIS_PACKET so that the header, options and data are
|
|
in the right order. Then we call the main forwarding function
|
|
|
|
Locks:
|
|
|
|
|
|
Arguments:
|
|
|
|
pPrimarySrcNte
|
|
pnpPacket
|
|
uiBytesCopied
|
|
|
|
Return Value:
|
|
|
|
None
|
|
|
|
--*/
|
|
|
|
{
|
|
FWContext *pFWC;
|
|
|
|
UNREFERENCED_PARAMETER(uiBytesCopied);
|
|
UNREFERENCED_PARAMETER(pPrimarySrcNte);
|
|
|
|
//
|
|
// DONT CALL ENTERDRIVER() HERE BECAUSE WE DID NOT CALL EXITDRIVER
|
|
// IF TD WAS PENDING
|
|
//
|
|
|
|
TraceEnter(FWD, "IPMForwardAfterTD");
|
|
|
|
pFWC = (FWContext *)pnpPacket->ProtocolReserved;
|
|
|
|
RtAssert(uiBytesCopied is pFWC->fc_datalength);
|
|
|
|
//
|
|
// After TD we get the data portion in the packet and the options, are in
|
|
// the Just call the main multicast function with the right arguments
|
|
//
|
|
|
|
|
|
IPMForward(pnpPacket,
|
|
NULL,
|
|
FALSE);
|
|
|
|
TraceLeave(FWD, "IPMForwardAfterTD");
|
|
|
|
ExitDriver();
|
|
|
|
return;
|
|
}
|
|
|
|
//
|
|
// MUST BE PAGED IN
|
|
//
|
|
|
|
#pragma alloc_text(PAGEIPMc, IPMForwardAfterRcv)
|
|
|
|
BOOLEAN
|
|
IPMForwardAfterRcv(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
IPHeader UNALIGNED *pHeader,
|
|
ULONG ulHeaderLength,
|
|
PVOID pvData,
|
|
ULONG ulBufferLength,
|
|
NDIS_HANDLE LContext1,
|
|
UINT LContext2,
|
|
BYTE byDestType,
|
|
LinkEntry *pLink
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This is the forwarding function called from IPRcv.
|
|
We look up the (S,G) entry.
|
|
If the entry is present, we do the RPF check. If it fails or if the
|
|
entry was NEGATIVE, we toss the packet out.
|
|
(The case of no entry is covered in IPMForward)
|
|
|
|
We get a new packet and header and fill that up. We set up the
|
|
forwarding context, and then check if we need to do a Transfer Data. If
|
|
so we call the lower layer's TD routine. If that returns pending, we
|
|
are done. If the TD is synchronous or was not needed at all, we set
|
|
the NDIS_PACKET so that the header, options and data are all properly
|
|
chained. Then we call the main forwarding routine
|
|
|
|
Locks:
|
|
|
|
|
|
Arguments:
|
|
|
|
SrcNTE - Pointer to NTE on which packet was received.
|
|
Packet - Packet being forwarded, used for TD.
|
|
Data - Pointer to data buffer being forwarded.
|
|
DataLength - Length in bytes of Data.
|
|
BufferLength - Length in bytes available in buffer pointer to by Data.
|
|
Offset - Offset into original data from which to transfer.
|
|
LContext1, LContext2 - Context values for the link layer.
|
|
|
|
|
|
Return Value:
|
|
|
|
TRUE if the IP filter-driver needs to be notified, FALSE otherwise.
|
|
|
|
--*/
|
|
|
|
{
|
|
Interface *pInIf;
|
|
PSOURCE pSource;
|
|
IPHeader *pNewHeader;
|
|
FWContext *pFWC;
|
|
ULONG ulDataLength, ulCopyBufLen;
|
|
ULONG ulDataLeft, ulNumBufs;
|
|
PVOID pvCopyPtr;
|
|
NDIS_STATUS nsStatus;
|
|
|
|
|
|
PNDIS_PACKET pnpNewPacket;
|
|
PNDIS_BUFFER pnbNewBuffer, pnbCopyBuffer;
|
|
|
|
|
|
#if DBG
|
|
ULONG ulBufCopied;
|
|
#endif
|
|
|
|
UNREFERENCED_PARAMETER(byDestType);
|
|
|
|
|
|
EnterDriverWithStatus(FALSE);
|
|
|
|
TraceEnter(RCV, "IPMForwardAfterRcv");
|
|
|
|
pInIf = pPrimarySrcNte->nte_if;
|
|
|
|
RtAssert(pInIf isnot &DummyInterface);
|
|
|
|
DumpIpHeader(RCV, INFO, pHeader);
|
|
|
|
Trace(RCV, INFO,
|
|
("IPMForwardAfterRcv: Incoming interface at 0x%x is %d\n",
|
|
pInIf, pInIf->if_index));
|
|
|
|
//
|
|
// Lookup the (S,G) entry and see if this needs to be discarded, if so
|
|
// throw it away
|
|
//
|
|
|
|
pSource = FindSGEntry(pHeader->iph_src,
|
|
pHeader->iph_dest);
|
|
|
|
if(pSource isnot NULL)
|
|
{
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: Found Source at 0x%x. In i/f is 0x%x. State is %x\n",
|
|
pSource, pSource->pInIpIf, pSource->byState));
|
|
|
|
//
|
|
// If the source doesnt exist we will do the right thing
|
|
// in IPMForwardPkt()
|
|
//
|
|
|
|
switch(pSource->byState)
|
|
{
|
|
case MFE_UNINIT:
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulUninitMfe++;
|
|
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
case MFE_NEGATIVE:
|
|
{
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: Negative MFE \n"));
|
|
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulNegativeMfe++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
case MFE_QUEUE:
|
|
{
|
|
//
|
|
// if we are going to drop the packet, may as well do it
|
|
// now, before we allocate and resources
|
|
//
|
|
|
|
if(pSource->ulNumPending >= MAX_PENDING)
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulQueueOverflow++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
Trace(RCV, INFO,
|
|
("IPMForwardAfterRcv: MFE Queue is full\n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case MFE_INIT:
|
|
{
|
|
if(pInIf isnot pSource->pInIpIf)
|
|
{
|
|
UpdateActivityTime(pSource);
|
|
//
|
|
// See if we need to generate a wrong i/f upcall
|
|
//
|
|
|
|
ProcessWrongIfUpcall(pInIf,
|
|
pSource,
|
|
pLink,
|
|
pHeader,
|
|
ulHeaderLength,
|
|
NULL,
|
|
0,
|
|
pvData,
|
|
ulBufferLength);
|
|
//
|
|
// If the packet shouldnt be accepted - stop now
|
|
//
|
|
|
|
if(!(pInIf->if_mcastflags & IPMCAST_IF_ACCEPT_ALL))
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulPktsDifferentIf++;
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcv: Pkt from %d.%d.%d.%d to %d.%d.%d.%d came in on 0x%x instead of 0x%x\n",
|
|
PRINT_IPADDR(pHeader->iph_src),
|
|
PRINT_IPADDR(pHeader->iph_dest),
|
|
pInIf ? pInIf->if_index : 0,
|
|
pSource->pInIpIf ? pSource->pInIpIf->if_index : 0));
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: RPF failed \n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// We have come in through Receive Indication, means we dont
|
|
// have ownership of the packet. So we copy out to our
|
|
// own packet
|
|
//
|
|
|
|
//
|
|
// Get a header for the packet. We use the incoming interface as
|
|
// the IF
|
|
//
|
|
|
|
|
|
if((pNewHeader = GetFWPacket(&pnpNewPacket)) is NULL)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcv: Unable to get new packet/header \n"));
|
|
|
|
//
|
|
// Could not get a packet. We have not allocated anything as yet
|
|
// so just bail out
|
|
//
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Should see which is more effecient - RtlCopyMemory or structure
|
|
// assignment
|
|
//
|
|
|
|
RtlCopyMemory(pNewHeader,
|
|
pHeader,
|
|
sizeof(IPHeader));
|
|
|
|
//
|
|
// Macro defined above
|
|
//
|
|
|
|
#if MCAST_COMP_DBG
|
|
|
|
Trace(FWD, INFO, ("IPMForwardAfterRcv: New Packet 0x%x New Header 0x%x\n",pnpNewPacket, pNewHeader));
|
|
|
|
((PacketContext *)pnpNewPacket->ProtocolReserved)->PCFLAGS |= PACKET_FLAG_IPMCAST;
|
|
|
|
#endif
|
|
|
|
InitForwardContext();
|
|
|
|
if(ulHeaderLength isnot sizeof(IPHeader))
|
|
{
|
|
//
|
|
// We have options, Do the Right Thing (TM)
|
|
//
|
|
|
|
nsStatus = ProcessOptions(pFWC,
|
|
ulHeaderLength,
|
|
pHeader);
|
|
|
|
if(nsStatus isnot NDIS_STATUS_SUCCESS)
|
|
{
|
|
//
|
|
// No ICMP packet if we fail
|
|
//
|
|
|
|
if(pSource)
|
|
{
|
|
pSource->ulInHdrErrors++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
IPSInfo.ipsi_inhdrerrors++;
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
}
|
|
|
|
//
|
|
// Total size of the IP Datagram sans header and options
|
|
//
|
|
|
|
ulDataLength = net_short(pHeader->iph_length) - ulHeaderLength;
|
|
|
|
pFWC->fc_datalength = ulDataLength;
|
|
|
|
//
|
|
// Get the buffers for the packet. This routine
|
|
// chains the buffers to the front of the packet
|
|
//
|
|
|
|
if (!ulDataLength)
|
|
{
|
|
pnbNewBuffer = NULL;
|
|
ulNumBufs = 0;
|
|
nsStatus = STATUS_SUCCESS;
|
|
}
|
|
else
|
|
{
|
|
nsStatus = AllocateCopyBuffers(pnpNewPacket,
|
|
ulDataLength,
|
|
&pnbNewBuffer,
|
|
&ulNumBufs);
|
|
}
|
|
|
|
if(nsStatus isnot STATUS_SUCCESS)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcv: Unable to allocate buffers for copying\n"));
|
|
|
|
//
|
|
// At this point we have allocate the packet and possibly, space
|
|
// for options. FreeFWPacket takes care of all that provided
|
|
// the fc_options points to the options. It however does not
|
|
// clear the option flag
|
|
//
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// See if the packet requires a transfer data
|
|
//
|
|
|
|
if(ulDataLength <= ulBufferLength)
|
|
{
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: All data is present, copying\n"));
|
|
|
|
//
|
|
// Everything here copy and call the main forwarding function
|
|
//
|
|
|
|
pnbCopyBuffer = pnbNewBuffer;
|
|
ulDataLeft = ulDataLength;
|
|
|
|
#if DBG
|
|
ulBufCopied = 0;
|
|
#endif
|
|
|
|
while(ulDataLeft)
|
|
{
|
|
//
|
|
// TODO: This is inefficient. Figure out a better way.
|
|
//
|
|
|
|
TcpipQueryBuffer(pnbCopyBuffer,
|
|
&pvCopyPtr,
|
|
(PUINT) &ulCopyBufLen,
|
|
NormalPagePriority);
|
|
|
|
if(pvCopyPtr is NULL)
|
|
{
|
|
nsStatus = STATUS_NO_MEMORY;
|
|
break;
|
|
}
|
|
|
|
RtlCopyMemory(pvCopyPtr,
|
|
pvData,
|
|
ulCopyBufLen);
|
|
|
|
pvData = (PVOID)((PBYTE)pvData + ulCopyBufLen);
|
|
|
|
ulDataLeft -= ulCopyBufLen;
|
|
pnbCopyBuffer = NDIS_BUFFER_LINKAGE(pnbCopyBuffer);
|
|
|
|
#if DBG
|
|
ulBufCopied++;
|
|
#endif
|
|
}
|
|
|
|
//
|
|
// Cleanup on data copy failure.
|
|
//
|
|
|
|
if (nsStatus isnot STATUS_SUCCESS)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcv: Unable to copy data\n"));
|
|
|
|
//
|
|
// At this point we have allocate the packet and possibly, sp
|
|
// for options. FreeFWPacket takes care of all that provided
|
|
// the fc_options points to the options. It however does not
|
|
// clear the option flag
|
|
//
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
}
|
|
else
|
|
{
|
|
#if DBG
|
|
RtAssert(ulBufCopied is ulNumBufs);
|
|
#endif
|
|
|
|
nsStatus = IPMForward(pnpNewPacket,
|
|
pSource,
|
|
FALSE);
|
|
|
|
//
|
|
// Do not need to release the lock or deref source because
|
|
// IPMForward would have done it
|
|
//
|
|
}
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Either all the data is not around, or lower layer
|
|
// wants to force us to do a TD
|
|
//
|
|
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: Datagram size is %d, buffer is %d. Copy flag is %s. TD needed\n",
|
|
ulDataLength,
|
|
ulBufferLength,
|
|
(pPrimarySrcNte->nte_flags & NTE_COPY)? "SET":"CLEARED"));
|
|
|
|
//
|
|
// Call the transfer data function
|
|
//
|
|
|
|
nsStatus = (pInIf->if_transfer)(pInIf->if_lcontext,
|
|
LContext1,
|
|
LContext2,
|
|
ulHeaderLength,
|
|
ulDataLength,
|
|
pnpNewPacket,
|
|
&(pFWC->fc_datalength));
|
|
|
|
if(nsStatus isnot NDIS_STATUS_PENDING)
|
|
{
|
|
if(nsStatus isnot NDIS_STATUS_SUCCESS)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcv: TD failed status %X\n",
|
|
nsStatus));
|
|
|
|
//
|
|
// Failed for some reason, bail out here
|
|
// Since we have allocated resources, call the send
|
|
// completion routine
|
|
//
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// TD finished synchronously
|
|
//
|
|
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: TD returned synchronously\n"));
|
|
|
|
nsStatus = IPMForward(pnpNewPacket,
|
|
pSource,
|
|
FALSE);
|
|
|
|
//
|
|
// Again, dont release or deref
|
|
//
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Transfer is pending
|
|
//
|
|
|
|
//
|
|
// The source info is lost across transfers if the Xfer is not
|
|
// synchronouse
|
|
//
|
|
|
|
if(pSource)
|
|
{
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcv: TD is pending\n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcv");
|
|
|
|
//
|
|
// DO NOT CALL EXITDRIVER() HERE SINCE THE XFER DATA IS PENDING
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// MUST BE PAGED IN
|
|
//
|
|
|
|
#pragma alloc_text(PAGEIPMc, IPMForwardAfterRcvPkt)
|
|
|
|
BOOLEAN
|
|
IPMForwardAfterRcvPkt(
|
|
NetTableEntry *pPrimarySrcNte,
|
|
IPHeader UNALIGNED *pHeader,
|
|
ULONG ulHeaderLength,
|
|
PVOID pvData,
|
|
ULONG ulBufferLength,
|
|
NDIS_HANDLE LContext1,
|
|
UINT LContext2,
|
|
BYTE byDestType,
|
|
UINT uiMacHeaderSize,
|
|
PNDIS_BUFFER pNdisBuffer,
|
|
uint *pClientCnt,
|
|
LinkEntry *pLink
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function is called from when we get a ReceivePacket indication
|
|
We look up the (S,G) entry. If the entry is not present, we copy and queue
|
|
the packet, and complete an IRP up to the Router Manager.
|
|
If the entry is present, we do the RPF check. If it fails we toss the
|
|
packet out.
|
|
If the (S,G) entry is a negative cache, we discard the packet
|
|
If the entry is queueing at present, we copy and queue the packet
|
|
|
|
Then we create a new packet since the Miniport reserved fields are being
|
|
used by the receive miniport. We set up the forwarding context and munge
|
|
the old header.
|
|
|
|
If there is only one outgoing interface (no need to copy), no
|
|
fragmentation is needed, no demand dial needs to be done, there are no
|
|
options and there is no padding put on by the lower layers, we take the
|
|
fast path and send the same packet out
|
|
|
|
On the slow path, we copy out the packet and header and call the main
|
|
forwarding function
|
|
|
|
Locks:
|
|
|
|
|
|
Arguments:
|
|
|
|
pPrimarySrcNte
|
|
pHeader
|
|
ulHeaderLength
|
|
pvData
|
|
ulBufferLength
|
|
LContext1
|
|
LContext2
|
|
byDestType
|
|
uiMacHeaderSize
|
|
pNdisBuffer
|
|
pClientCnt
|
|
pLink
|
|
|
|
Return Value:
|
|
|
|
TRUE if the IP filter-driver needs to be notified, FALSE otherwise.
|
|
|
|
--*/
|
|
|
|
{
|
|
Interface *pInIf;
|
|
PSOURCE pSource;
|
|
IPHeader *pNewHeader;
|
|
FWContext *pFWC;
|
|
ULONG ulBytesCopied;
|
|
ULONG ulDataLength, ulSrcOffset;
|
|
ULONG ulNumBufs, ulBuffCount;
|
|
NDIS_STATUS nsStatus;
|
|
POUT_IF pOutIf = NULL;
|
|
BOOLEAN bHoldPacket;
|
|
PNDIS_PACKET pnpNewPacket;
|
|
PNDIS_BUFFER pnbNewBuffer;
|
|
FORWARD_ACTION faAction;
|
|
IPPacketFilterPtr FilterPtr;
|
|
ULONG xsum;
|
|
|
|
#if DBG
|
|
|
|
ULONG ulPacketLength;
|
|
|
|
#endif
|
|
|
|
UNREFERENCED_PARAMETER(LContext2);
|
|
UNREFERENCED_PARAMETER(byDestType);
|
|
|
|
ulBuffCount = 0;
|
|
|
|
EnterDriverWithStatus(FALSE);
|
|
|
|
TraceEnter(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
//
|
|
// Set client count to 0 so that the lower layer doesnt
|
|
// think we are holding on to the packet, if we bail out
|
|
//
|
|
|
|
*pClientCnt = 0;
|
|
bHoldPacket = TRUE;
|
|
|
|
|
|
pInIf = pPrimarySrcNte->nte_if;
|
|
|
|
RtAssert(pInIf isnot &DummyInterface);
|
|
|
|
DumpIpHeader(RCV, INFO, pHeader);
|
|
|
|
Trace(RCV, INFO,
|
|
("IPMForwardAfterRcvPkt: Incoming interface at 0x%x is %d\n",
|
|
pInIf, pInIf->if_index));
|
|
|
|
//
|
|
// As usual, first thing is to lookup the (S,G) entry for this packet
|
|
//
|
|
|
|
pSource = FindSGEntry(pHeader->iph_src,
|
|
pHeader->iph_dest);
|
|
|
|
if(pSource isnot NULL)
|
|
{
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcvPkt: Found Source at 0x%x. In i/f is 0x%x. State is %x\n",
|
|
pSource, pSource->pInIpIf, pSource->byState));
|
|
|
|
//
|
|
// If the source doesnt exist we will do the right thing
|
|
// in IPMForwardPkt()
|
|
//
|
|
|
|
//
|
|
// We only increment statistics if we are not going to
|
|
// call IPMForward().
|
|
//
|
|
|
|
switch(pSource->byState)
|
|
{
|
|
case MFE_UNINIT:
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulUninitMfe++;
|
|
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
case MFE_NEGATIVE:
|
|
{
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcvPkt: Negative MFE \n"));
|
|
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulNegativeMfe++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
case MFE_QUEUE:
|
|
{
|
|
if(pSource->ulNumPending >= MAX_PENDING)
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulQueueOverflow++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
Trace(RCV, INFO,
|
|
("IPMForwardAfterRcvPkt: MFE Queue is full\n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
pOutIf = NULL;
|
|
|
|
bHoldPacket = FALSE;
|
|
|
|
break;
|
|
}
|
|
|
|
case MFE_INIT:
|
|
{
|
|
if(pInIf isnot pSource->pInIpIf)
|
|
{
|
|
UpdateActivityTime(pSource);
|
|
|
|
//
|
|
// See if we need to generate a wrong i/f upcall
|
|
//
|
|
ProcessWrongIfUpcall(pInIf,
|
|
pSource,
|
|
pLink,
|
|
pHeader,
|
|
ulHeaderLength,
|
|
NULL,
|
|
0,
|
|
pvData,
|
|
ulBufferLength);
|
|
|
|
//
|
|
// If the packet shouldnt be accepted - stop now
|
|
//
|
|
|
|
if(!(pInIf->if_mcastflags & IPMCAST_IF_ACCEPT_ALL))
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulPktsDifferentIf++;
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcvPkt: Pkt from %d.%d.%d.%d to %d.%d.%d.%d came in on 0x%x instead of 0x%x\n",
|
|
PRINT_IPADDR(pHeader->iph_src),
|
|
PRINT_IPADDR(pHeader->iph_dest),
|
|
pInIf ? pInIf->if_index : 0,
|
|
pSource->pInIpIf ? pSource->pInIpIf->if_index : 0));
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
Trace(RCV, TRACE,
|
|
("IPMForwardAfterRcvPkt: RPF failed \n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
pOutIf = pSource->pFirstOutIf;
|
|
|
|
RtAssert(pOutIf);
|
|
|
|
bHoldPacket = (BOOLEAN) (pOutIf->pIpIf isnot &DummyInterface);
|
|
bHoldPacket = (BOOLEAN) (pSource->ulNumOutIf is 1);
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
bHoldPacket = FALSE;
|
|
}
|
|
|
|
//
|
|
// Since this function was called due to ReceivePacket, we dont have
|
|
// ownership of the Protocol reserved section, so allocate a new packet
|
|
// Unfortunately, getting a new packet, causes a new header to be allocate
|
|
// but what the heck, we will go with that scheme instead of inventing
|
|
// our own buffer management
|
|
//
|
|
|
|
//
|
|
// For the interface we use the INCOMING interface.
|
|
// And we specify DestType to be DEST_REMOTE. This way the queue looked at
|
|
// is the interface queue, as opposed to the global bcast queue.
|
|
//
|
|
|
|
|
|
if((pNewHeader = GetFWPacket(&pnpNewPacket)) is NULL)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
//
|
|
// Could not get a packet. We have not allocated anything as yet
|
|
// so just bail out
|
|
//
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcvPkt: Unable to get new packet/header\n"));
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// So we have a new packet. Fix up the packet
|
|
// Save the packet forwarding context info.
|
|
//
|
|
|
|
#if MCAST_COMP_DBG
|
|
|
|
Trace(FWD, INFO, ("IPMForwardAfterRcvPkt: New Packet 0x%x New Header 0x%x\n",pnpNewPacket, pNewHeader));
|
|
|
|
((PacketContext *)pnpNewPacket->ProtocolReserved)->PCFLAGS |= PACKET_FLAG_IPMCAST;
|
|
|
|
#endif
|
|
|
|
InitForwardContext();
|
|
|
|
if(ulHeaderLength isnot sizeof(IPHeader))
|
|
{
|
|
nsStatus = ProcessOptions(pFWC,
|
|
ulHeaderLength,
|
|
pHeader);
|
|
|
|
if(nsStatus isnot NDIS_STATUS_SUCCESS)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInHdrErrors++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
IPSInfo.ipsi_inhdrerrors++;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
bHoldPacket = FALSE;
|
|
}
|
|
|
|
ulDataLength = net_short(pHeader->iph_length) - ulHeaderLength;
|
|
|
|
pFWC->fc_datalength = ulDataLength;
|
|
|
|
//
|
|
// Now we can try for the fast forward path. For that
|
|
// (i) we should have a complete MFE
|
|
// (ii) the number of outgoing interface should be 1
|
|
// (iii) fragmentation should not be needed
|
|
// (iv) the lower layer driver should not be running out of buffers,
|
|
// (v) no demand dial should be necessary
|
|
// (vi) no options should be present
|
|
// (vii) IMPORTANT - there is no padding at the end of the buffer
|
|
//
|
|
|
|
|
|
|
|
if((bHoldPacket) and
|
|
(net_short(pHeader->iph_length) <= (USHORT)(pOutIf->pIpIf->if_mtu)) and
|
|
(NDIS_GET_PACKET_STATUS((PNDIS_PACKET)LContext1) isnot NDIS_STATUS_RESOURCES))
|
|
{
|
|
|
|
RtAssert(pOutIf->pNextOutIf is NULL);
|
|
RtAssert(pSource);
|
|
RtAssert(pOutIf->pIpIf isnot &DummyInterface);
|
|
RtAssert(!pFWC->fc_options);
|
|
|
|
#if DBG
|
|
|
|
if(pFWC->fc_options)
|
|
{
|
|
RtAssert(pFWC->fc_optlength);
|
|
RtAssert(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS);
|
|
}
|
|
else
|
|
{
|
|
RtAssert(pFWC->fc_optlength is 0);
|
|
RtAssert(!(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS));
|
|
}
|
|
|
|
#endif
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForwardAfterRcvPkt: Fast Forwarding packet\n"));
|
|
|
|
pFWC->fc_bufown = LContext1;
|
|
pFWC->fc_MacHdrSize = uiMacHeaderSize;
|
|
|
|
pFWC->fc_nexthop = pOutIf->dwNextHopAddr;
|
|
|
|
//
|
|
// Munge ttl and xsum fields
|
|
//
|
|
|
|
pHeader->iph_ttl--;
|
|
|
|
if(pHeader->iph_ttl < pOutIf->pIpIf->if_mcastttl)
|
|
{
|
|
//
|
|
// TTL is lower than scope
|
|
//
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulTtlTooLow));
|
|
|
|
Trace(FWD, WARN,
|
|
("IPMForwardAfterRcvPkt: Packet ttl is %d, I/f ttl is %d. Dropping\n",
|
|
pHeader->iph_ttl,
|
|
pOutIf->pIpIf->if_mcastttl));
|
|
|
|
//
|
|
// Here we always have a source
|
|
//
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
xsum = pHeader->iph_xsum + 1;
|
|
xsum = (ushort)(xsum + (xsum >> 16));
|
|
pHeader->iph_xsum = (USHORT)xsum;
|
|
|
|
//
|
|
// See if we need to filter
|
|
//
|
|
|
|
if(RefPtrValid(&FilterRefPtr))
|
|
{
|
|
//
|
|
// We have a pointer to the header and we have
|
|
// a pointer to the data - alles ok
|
|
//
|
|
|
|
FilterPtr = AcquireRefPtr(&FilterRefPtr);
|
|
|
|
faAction = (*FilterPtr) (pHeader, pvData, ulBufferLength,
|
|
pInIf->if_index, pOutIf->pIpIf->if_index,
|
|
NULL_IP_ADDR, NULL_IP_ADDR);
|
|
|
|
ReleaseRefPtr(&FilterRefPtr);
|
|
|
|
if(faAction isnot FORWARD)
|
|
{
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
|
|
//
|
|
// We are assured of a source
|
|
//
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
//DerefIF(IF);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Adjust incoming mdl pointer and counts
|
|
//
|
|
|
|
NdisAdjustBuffer(
|
|
pNdisBuffer,
|
|
(PCHAR) NdisBufferVirtualAddress(pNdisBuffer) + uiMacHeaderSize,
|
|
NdisBufferLength(pNdisBuffer) - uiMacHeaderSize
|
|
);
|
|
|
|
//
|
|
// Now link this mdl to the packet
|
|
//
|
|
|
|
pnpNewPacket->Private.Head = pNdisBuffer;
|
|
pnpNewPacket->Private.Tail = pNdisBuffer;
|
|
|
|
RtAssert(pNdisBuffer->Next is NULL);
|
|
|
|
pnpNewPacket->Private.TotalLength = ulDataLength + ulHeaderLength;
|
|
pnpNewPacket->Private.Count = 1;
|
|
|
|
UpdateActivityTime(pSource);
|
|
|
|
//
|
|
// Let go of the lock
|
|
//
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
//
|
|
// Mark the packet as not being loop-backed
|
|
//
|
|
|
|
NdisSetPacketFlags(pnpNewPacket,
|
|
NDIS_FLAGS_DONT_LOOPBACK);
|
|
|
|
nsStatus = (*(pOutIf->pIpIf->if_xmit))(pOutIf->pIpIf->if_lcontext,
|
|
&pnpNewPacket,
|
|
1,
|
|
pOutIf->dwNextHopAddr,
|
|
NULL,
|
|
NULL);
|
|
|
|
if(nsStatus isnot NDIS_STATUS_PENDING)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForwardAfterRcvPkt: Fast Forward completed with status %x\n",
|
|
nsStatus));
|
|
|
|
|
|
NdisAdjustBuffer(
|
|
pNdisBuffer,
|
|
(PCHAR) NdisBufferVirtualAddress(pNdisBuffer) - uiMacHeaderSize,
|
|
NdisBufferLength(pNdisBuffer) + uiMacHeaderSize
|
|
);
|
|
|
|
pnpNewPacket->Private.Head = NULL;
|
|
pnpNewPacket->Private.Tail = NULL;
|
|
|
|
pFWC->fc_bufown = NULL;
|
|
|
|
//
|
|
// Since client count is 0
|
|
// we dont need to call FWSendComplete
|
|
//
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
|
|
FreeFWPacket(pnpNewPacket);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Okay, the xmit is pending indicate this to ndis.
|
|
//
|
|
|
|
*pClientCnt = 1;
|
|
}
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Copy the header out at this point because if we get into
|
|
// the fast path, the copy would be a waste
|
|
//
|
|
|
|
RtlCopyMemory(pNewHeader,
|
|
pHeader,
|
|
sizeof(IPHeader));
|
|
|
|
//
|
|
// Good old slow path. We already have the header, allocate and copy
|
|
// out the data and pass it to the main function
|
|
//
|
|
|
|
if (!ulDataLength)
|
|
{
|
|
ulNumBufs = 0;
|
|
pnbNewBuffer = NULL;
|
|
nsStatus = STATUS_SUCCESS;
|
|
}
|
|
else
|
|
{
|
|
nsStatus = AllocateCopyBuffers(pnpNewPacket,
|
|
ulDataLength,
|
|
&pnbNewBuffer,
|
|
&ulNumBufs);
|
|
}
|
|
|
|
if(nsStatus isnot STATUS_SUCCESS)
|
|
{
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForwardAfterRcvPkt: Unable to allocate buffers for copying\n"));
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Now we have a MDL chain which we need to copy to a chain of NDIS buffers
|
|
// which is nothing but another MDL chain.
|
|
// We want to copy out only the data. So we need to start after the
|
|
// header but copy to the beginning of the destination buffer
|
|
//
|
|
|
|
ulSrcOffset = ulHeaderLength + (ULONG)uiMacHeaderSize;
|
|
|
|
nsStatus = TdiCopyMdlChainToMdlChain(pNdisBuffer,
|
|
ulSrcOffset,
|
|
pnbNewBuffer,
|
|
0,
|
|
&ulBytesCopied);
|
|
|
|
if (nsStatus isnot STATUS_SUCCESS)
|
|
{
|
|
ULONG ulNdisPktSize;
|
|
|
|
NdisQueryPacket(pnpNewPacket,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
(PUINT) &ulNdisPktSize);
|
|
|
|
//
|
|
// Some problem here
|
|
//
|
|
|
|
if(pSource)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
Trace(RCV,ERROR,
|
|
("IPMForwardAfterRcvPkt: Copying chain with offset %d to %d sized MDL-chain returned %x with %d bytes copied\n",
|
|
ulSrcOffset,
|
|
ulNdisPktSize,
|
|
nsStatus,
|
|
ulBytesCopied));
|
|
|
|
//
|
|
// Free options and option buffer if any
|
|
//
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpNewPacket);
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
#if DBG
|
|
|
|
NdisQueryPacket(pnpNewPacket,
|
|
NULL,
|
|
(PUINT) &ulBuffCount,
|
|
NULL,
|
|
(PUINT) &ulPacketLength);
|
|
|
|
RtAssert(ulBuffCount is ulNumBufs);
|
|
|
|
RtAssert(ulPacketLength is ulBytesCopied);
|
|
|
|
#endif
|
|
|
|
nsStatus = IPMForward(pnpNewPacket,
|
|
pSource,
|
|
FALSE);
|
|
|
|
//
|
|
// Dont release or deref
|
|
//
|
|
|
|
TraceLeave(RCV, "IPMForwardAfterRcvPkt");
|
|
|
|
ExitDriver();
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// MUST BE PAGED IN
|
|
//
|
|
|
|
#pragma alloc_text(PAGEIPMc, IPMForward)
|
|
|
|
NTSTATUS
|
|
IPMForward(
|
|
IN PNDIS_PACKET pnpPacket,
|
|
IN PSOURCE pSource OPTIONAL,
|
|
IN BOOLEAN bSendFromQueue
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This is the main multicast forwarding routine. It is called from
|
|
the three top level forwarding routines (IPMForwardAfterRcv,
|
|
IPMForwardAfterRcvPkt and IPMForwardAfterTD)
|
|
|
|
It is always called with a complete packet (either one buffer or chained
|
|
buffers) and we always have final ownership of the packet.
|
|
|
|
The NDIS_PACKET for the datagram must be a FWPacket and must be
|
|
chained when this function is called. The various parts of the data are:
|
|
|
|
Comp Size Allocated in Stored at
|
|
---------------------------------------------------------------
|
|
Header sizeof(IPHeader) GrowFWPacket fc_hbuff
|
|
Hdr Buffer NDIS_BUFFER GrowFWPacket fc_hndisbuff
|
|
Options fc_optlength ForwardAfterRcv fc_option
|
|
ForwardAfterRcvPkt
|
|
Opt Buffer NDIS_BUFFER SendIPPacket (later) 2nd buffer if
|
|
..FLAG_OPTIONS is set
|
|
Data fc_datalength ForwardAfterRcv fc_buffhead
|
|
ForwardAfterRcvPkt
|
|
|
|
The data is also chained to the NDIS_PACKET as the first buffer
|
|
|
|
The NDIS_PACKET must have the FWContext all setup before this routine
|
|
is called. All necessary information is retrieved using the FWC
|
|
|
|
All this chaining needs to be undone in the routine, since SendIPPacket()
|
|
requires an unchained buffer.
|
|
|
|
We first try and find an (S,G) entry if one is not already passed to us.
|
|
If we dont have an entry, then we copy and queue the packet while
|
|
sending a notification to Router Manager. As as side effect an entry with
|
|
a state of QUEUEING gets created so that other packets coming in just get
|
|
queued here.
|
|
If we do find an entry, then according to the state of the entry, we
|
|
either drop the packet, queue it or continue processing it.
|
|
We do an RPF check and if that fails, the packet is dropped.
|
|
Since we may potentially duplicate the packet (or even fragment it), we
|
|
allocate a BufferReference. The BuffRef keeps track of the ORIGINAL
|
|
BUFFERS. These are the ones that point to the data and were allocated
|
|
out of our FWBuffer pool.
|
|
We copy out the headers and options into a flat buffer to use with
|
|
Filtering callout.
|
|
Then for each IF on the outgoing list:
|
|
We get a pointer to the primary NTE. This is needed to process options
|
|
since we need the address of the outgoing interface
|
|
For all but the last interface, we allocate a new header and new
|
|
packet. (For the last interface we use the packet and header that was
|
|
passed to us in this routine. So for the last interface, the packet,
|
|
header, options and buffer descriptors come from the FWPacket/Buffer
|
|
pool, where as for all other interfaces, the header and packet are
|
|
plain IP buffers and the memory for options is allocated in this
|
|
routine.)
|
|
If there are options, we allocate memory for the options and update
|
|
them.
|
|
Then we see if the packet needs to be fragmented. To do this we use
|
|
the MTU of the outgoing interface. This is different from UNICAST
|
|
where we used the mtu in the route - because that is where the
|
|
updated mtu from PathMTU discovery is kept. Since we dont do path
|
|
MTU discovery for multicast, we just use the MTU of the outgoing i/f
|
|
So if the IP Data length + OptionSize + Header Size > if_mtu, we
|
|
call IPFragment(), otherwise we send the packet out using
|
|
SendIPPacket().
|
|
For each pending send from SendIPPacket(), we increase the refcount
|
|
on the BuffRef. IPFragment() may increase the refcount by more than
|
|
1 for each call because it breaks the packet into two or more packets.
|
|
|
|
NOTE: We pass the original data buffers to SendIPPacket() and to
|
|
IPFragment(). This way we only copy out the header and the options. This
|
|
is better than HenrySa's SendIPBCast() which copies out the whole data.
|
|
|
|
Locks:
|
|
|
|
This code is assumed to run at DPCLevel. If a PSOURCE is passed to the
|
|
function, it is assumed to be Referenced and Locked.
|
|
|
|
Arguments:
|
|
|
|
pnpPacket
|
|
pSource
|
|
bSendFromQueue
|
|
|
|
Return Value:
|
|
|
|
STATUS_SUCCESS
|
|
|
|
--*/
|
|
|
|
{
|
|
NetTableEntry *pPrimarySrcNte, *pOutNte;
|
|
IPHeader *pHeader, *pNewHeader;
|
|
FWContext *pFWC;
|
|
PNDIS_PACKET pnpNewPacket;
|
|
PNDIS_BUFFER pnbDataBuffer;
|
|
PBYTE pbyNewOptions;
|
|
POUT_IF pOutIf;
|
|
BufferReference *pBuffRef;
|
|
NTSTATUS nsStatus;
|
|
ULONG ulDataLength, ulSent;
|
|
PacketContext *pPC;
|
|
FORWARD_ACTION faAction;
|
|
IPPacketFilterPtr FilterPtr;
|
|
PVOID pvData;
|
|
UINT uiFirstBufLen;
|
|
Interface *pInIf;
|
|
DWORD dwNewIndex;
|
|
INT iBufRefCount;
|
|
LinkEntry *pLink;
|
|
|
|
#if DBG
|
|
|
|
PNDIS_BUFFER pnpFirstBuffer;
|
|
ULONG ulTotalPacketLength, ulTotalHdrLength;
|
|
|
|
#endif
|
|
|
|
|
|
TraceEnter(FWD, "IPMForward");
|
|
|
|
#if DBG
|
|
|
|
//
|
|
// Lets make sure that this is a forwardable multicast
|
|
//
|
|
|
|
#endif
|
|
|
|
pFWC = (FWContext *)pnpPacket->ProtocolReserved;
|
|
|
|
pPrimarySrcNte = pFWC->fc_srcnte;
|
|
pInIf = pPrimarySrcNte->nte_if;
|
|
pHeader = pFWC->fc_hbuff;
|
|
ulDataLength = pFWC->fc_datalength;
|
|
pnbDataBuffer = pFWC->fc_buffhead;
|
|
pLink = pFWC->fc_iflink;
|
|
|
|
//
|
|
// Check to make sure the buffer and packets are
|
|
// as we expect
|
|
//
|
|
|
|
RtAssert(pPrimarySrcNte);
|
|
RtAssert(pHeader);
|
|
|
|
//
|
|
// Setup pvData to point to the first part of the data
|
|
// so that the filter driver can get to it in a flat
|
|
// buffer
|
|
//
|
|
|
|
if (!pnbDataBuffer)
|
|
{
|
|
pvData = NULL;
|
|
uiFirstBufLen = 0;
|
|
}
|
|
else
|
|
{
|
|
TcpipQueryBuffer(pnbDataBuffer,
|
|
&pvData,
|
|
&uiFirstBufLen,
|
|
NormalPagePriority);
|
|
|
|
if(pvData is NULL)
|
|
{
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: failed to query data buffer.\n"));
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
if(pSource)
|
|
{
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
}
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
|
|
if(pFWC->fc_options)
|
|
{
|
|
RtAssert(pFWC->fc_optlength);
|
|
RtAssert(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS);
|
|
}
|
|
else
|
|
{
|
|
RtAssert(pFWC->fc_optlength is 0);
|
|
RtAssert(!(pFWC->FCFLAGS & PACKET_FLAG_OPTIONS));
|
|
}
|
|
|
|
//
|
|
// "To make assurance doubly sure." Extra points to the person
|
|
// who gets the quote
|
|
//
|
|
|
|
NdisQueryPacket(pnpPacket,
|
|
NULL,
|
|
NULL,
|
|
&pnpFirstBuffer,
|
|
(PUINT) &ulTotalPacketLength);
|
|
|
|
RtAssert(pnpFirstBuffer is pFWC->fc_buffhead);
|
|
RtAssert(ulTotalPacketLength is ulDataLength);
|
|
|
|
ulTotalHdrLength = sizeof(IPHeader) + pFWC->fc_optlength;
|
|
ulTotalPacketLength = net_short(pHeader->iph_length) - ulTotalHdrLength;
|
|
|
|
RtAssert(ulTotalPacketLength is ulDataLength);
|
|
|
|
#endif
|
|
|
|
if(!ARGUMENT_PRESENT(pSource))
|
|
{
|
|
//
|
|
// This happens when we come through the TD path or
|
|
// when dont have a (S,G) entry in our MFIB
|
|
//
|
|
|
|
pSource = FindSGEntry(pHeader->iph_src,
|
|
pHeader->iph_dest);
|
|
}
|
|
|
|
if(pSource is NULL)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: No (S,G,) entry found\n"));
|
|
|
|
//
|
|
// Invoke the IP filter driver.
|
|
//
|
|
|
|
if (RefPtrValid(&FilterRefPtr))
|
|
{
|
|
ASSERT(!bSendFromQueue);
|
|
FilterPtr = AcquireRefPtr(&FilterRefPtr);
|
|
faAction = (*FilterPtr) (pHeader, pvData, uiFirstBufLen,
|
|
pPrimarySrcNte->nte_if->if_index,
|
|
INVALID_IF_INDEX,
|
|
NULL_IP_ADDR, NULL_IP_ADDR);
|
|
ReleaseRefPtr(&FilterRefPtr);
|
|
|
|
if(faAction != FORWARD)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Filter returned %d\n",
|
|
faAction));
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
FreeFWPacket(pnpPacket);
|
|
TraceLeave(FWD, "IPMForward");
|
|
return STATUS_SUCCESS;
|
|
}
|
|
}
|
|
|
|
//
|
|
// No S found, create one, copy and queue the packet
|
|
// and complete and IRP to the router manager
|
|
//
|
|
|
|
nsStatus = CreateSourceAndQueuePacket(pHeader->iph_dest,
|
|
pHeader->iph_src,
|
|
pInIf->if_index,
|
|
pLink,
|
|
pnpPacket);
|
|
|
|
//
|
|
// We are not done with the packet, because it
|
|
// is queued. So we dont free it or call complete on it
|
|
//
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
Trace(FWD, TRACE,
|
|
("IPMForward: Source at 0x%x. In i/f is 0x%x. State is %x\n",
|
|
pSource, pSource->pInIpIf, pSource->byState));
|
|
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
|
|
switch(pSource->byState)
|
|
{
|
|
case MFE_UNINIT:
|
|
{
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
pSource->ulUninitMfe++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
if (!bSendFromQueue) {
|
|
NotifyFilterOfDiscard(pPrimarySrcNte, pHeader, pvData,
|
|
uiFirstBufLen);
|
|
}
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
TraceLeave(RCV, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
case MFE_NEGATIVE:
|
|
{
|
|
//
|
|
// Throw the packet away
|
|
// IMPORTANT - DO NOT UPDATE THE ACTIVITY TIMESTAMP
|
|
// otherwise the upper layer protocols will never see the
|
|
// packets from this
|
|
//
|
|
|
|
pSource->ulNegativeMfe++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
if (!bSendFromQueue) {
|
|
NotifyFilterOfDiscard(pPrimarySrcNte, pHeader, pvData,
|
|
uiFirstBufLen);
|
|
}
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: MFE is negative, so discarding packet\n"));
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
case MFE_QUEUE:
|
|
{
|
|
//
|
|
// Invoke the IP filter driver.
|
|
//
|
|
|
|
if (RefPtrValid(&FilterRefPtr))
|
|
{
|
|
ASSERT(!bSendFromQueue);
|
|
FilterPtr = AcquireRefPtr(&FilterRefPtr);
|
|
faAction = (*FilterPtr) (pHeader, pvData, uiFirstBufLen,
|
|
pPrimarySrcNte->nte_if->if_index,
|
|
INVALID_IF_INDEX,
|
|
NULL_IP_ADDR, NULL_IP_ADDR);
|
|
ReleaseRefPtr(&FilterRefPtr);
|
|
|
|
if(faAction != FORWARD)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Filter returned %d\n",
|
|
faAction));
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Havent got a the MFE from user mode as yet, just
|
|
// queue the packet
|
|
//
|
|
|
|
Trace(RCV, INFO,
|
|
("IPMForward: MFE is queuing\n"));
|
|
|
|
UpdateActivityTime(pSource);
|
|
|
|
//
|
|
// Dont update pSource stats, this will be done the second
|
|
// time around
|
|
//
|
|
|
|
pSource->ulInPkts--;
|
|
pSource->ulInOctets -= net_short(pHeader->iph_length);
|
|
|
|
nsStatus = QueuePacketToSource(pSource,
|
|
pnpPacket);
|
|
|
|
if(nsStatus isnot STATUS_PENDING)
|
|
{
|
|
pSource->ulInPkts++;
|
|
pSource->ulInOctets += net_short(pHeader->iph_length);
|
|
pSource->ulInDiscards++;
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: QueuePacketToSource returned %x\n",
|
|
nsStatus));
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
}
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
TraceLeave(RCV, "IPMForward");
|
|
|
|
return nsStatus;
|
|
}
|
|
|
|
#if DBG
|
|
|
|
case MFE_INIT:
|
|
{
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
break;
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
if(pSource->pInIpIf isnot pPrimarySrcNte->nte_if)
|
|
{
|
|
UpdateActivityTime(pSource);
|
|
|
|
//
|
|
// See if we need to generate a wrong i/f upcall
|
|
//
|
|
|
|
ProcessWrongIfUpcall(pPrimarySrcNte->nte_if,
|
|
pSource,
|
|
pLink,
|
|
pHeader,
|
|
sizeof(IPHeader),
|
|
pFWC->fc_options,
|
|
pFWC->fc_optlength,
|
|
pvData,
|
|
uiFirstBufLen);
|
|
|
|
//
|
|
// If the packet shouldnt be accepted - stop now
|
|
//
|
|
|
|
if(!(pInIf->if_mcastflags & IPMCAST_IF_ACCEPT_ALL))
|
|
{
|
|
pSource->ulPktsDifferentIf++;
|
|
|
|
Trace(RCV, ERROR,
|
|
("IPMForward: Pkt from %d.%d.%d.%d to %d.%d.%d.%d came in on 0x%x instead of 0x%x\n",
|
|
PRINT_IPADDR(pHeader->iph_src),
|
|
PRINT_IPADDR(pHeader->iph_dest),
|
|
pInIf ? pInIf->if_index : 0,
|
|
pSource->pInIpIf ? pSource->pInIpIf->if_index : 0));
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
//
|
|
// RPF check failed. Throw the packet away
|
|
//
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: RPF Failed. In i/f %x (%d). RPF i/f %x (%d)\n",
|
|
pPrimarySrcNte->nte_if, pPrimarySrcNte->nte_if->if_index,
|
|
pSource->pInIpIf, pSource->pInIpIf->if_index));
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
}
|
|
|
|
//
|
|
// We need to unlink the packet so that the code below works properly.
|
|
// This is kind of painful, but SendIPPacket wants a packet which has
|
|
// only the header buffer chained to it
|
|
// We do th unlinking at this point because if we do it before this and
|
|
// queue the packet, then we will hit a ton of asserts we come here
|
|
// when the queue is being drained (since then we will be unlinking twice)
|
|
//
|
|
|
|
UnlinkDataFromPacket(pnpPacket, pFWC);
|
|
|
|
//
|
|
// Zero out the XSUM
|
|
//
|
|
|
|
pHeader->iph_xsum = 0x0000;
|
|
|
|
//
|
|
// Decrement the TTL
|
|
//
|
|
|
|
pHeader->iph_ttl--;
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: New TTL is %d\n",
|
|
pHeader->iph_ttl));
|
|
|
|
//
|
|
// The number of pending sends. Used later
|
|
//
|
|
|
|
ulSent = 0;
|
|
|
|
//
|
|
// Get a buffer reference. We need this if we are sending to
|
|
// more than one interface, or if we need to fragment.
|
|
// However, we always use a reference. This only increases
|
|
// memory and has no effect on the correctness
|
|
//
|
|
|
|
|
|
pBuffRef = CTEAllocMem(sizeof(BufferReference));
|
|
|
|
if(pBuffRef is NULL)
|
|
{
|
|
pSource->ulInDiscards++;
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
pFWC->FCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FreeFWPacket(pnpPacket);
|
|
|
|
IPSInfo.ipsi_indiscards++;
|
|
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: Could not allocate memory for BuffRef\n"));
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_NO_MEMORY;
|
|
}
|
|
|
|
UpdateActivityTime(pSource);
|
|
|
|
//
|
|
// Everything after this is InterlockedInc'ed
|
|
// We release the spinlock but still have the pSource refcounted.
|
|
//
|
|
|
|
RtReleaseSpinLockFromDpcLevel(&(pSource->mlLock));
|
|
|
|
//
|
|
// Initialize the BufferReference.It is init to 0. Even though
|
|
// some send completes may occur before we get a chance to bump
|
|
// the ref-count, that is not a problem because the send complete
|
|
// will cause it to go to a negative number which will not have any bad
|
|
// effect
|
|
//
|
|
|
|
pBuffRef->br_buffer = pFWC->fc_buffhead;
|
|
pBuffRef->br_refcount = 0;
|
|
|
|
CTEInitLock(&(pBuffRef->br_lock));
|
|
|
|
pPC = (PacketContext *)pnpPacket->ProtocolReserved;
|
|
|
|
pPC->pc_br = pBuffRef;
|
|
|
|
//
|
|
// Start looping through the OIFs
|
|
// We allocate a packet and a header for each interface except the last
|
|
// one. (For the last one we use the one given to us - since we own it).
|
|
// Instead of using a new buffer chain for each packet, we point to the
|
|
// old chain.
|
|
// The last packet is a FWPacket. All the others are simply IP Packets
|
|
//
|
|
|
|
for(pOutIf = pSource->pFirstOutIf;
|
|
pOutIf isnot NULL;
|
|
pOutIf = pOutIf->pNextOutIf)
|
|
{
|
|
//
|
|
// Skip it if the OIF matches the IIF
|
|
// The address check is for RAS clients.
|
|
//
|
|
|
|
if((pOutIf->pIpIf is pInIf) and
|
|
(pHeader->iph_src is pOutIf->dwNextHopAddr))
|
|
{
|
|
continue;
|
|
}
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Sending over i/f @ 0x%x\n",
|
|
pOutIf));
|
|
|
|
if(pOutIf->pIpIf is &DummyInterface)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Need to dial out\n"));
|
|
|
|
//
|
|
// Need to dial out
|
|
//
|
|
|
|
if (RefPtrValid(&DODRefPtr))
|
|
{
|
|
IPMapRouteToInterfacePtr DODCallout;
|
|
//
|
|
// Dial out pointer has been plumbed
|
|
//
|
|
DODCallout = AcquireRefPtr(&DODRefPtr);
|
|
dwNewIndex = (*DODCallout)(pOutIf->dwDialContext,
|
|
pHeader->iph_dest,
|
|
pHeader->iph_src,
|
|
pHeader->iph_protocol,
|
|
pvData,
|
|
uiFirstBufLen,
|
|
pHeader->iph_src);
|
|
ReleaseRefPtr(&DODRefPtr);
|
|
|
|
if(dwNewIndex isnot INVALID_IF_INDEX)
|
|
{
|
|
//
|
|
// This puts a reference on the interface
|
|
//
|
|
|
|
pOutIf->pIpIf = GetInterfaceGivenIndex(dwNewIndex);
|
|
|
|
RtAssert(pOutIf->pIpIf isnot &DummyInterface);
|
|
RtAssert(pOutIf->pIpIf isnot &LoopInterface);
|
|
}
|
|
else
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No call out!
|
|
//
|
|
#pragma warning(push)
|
|
#pragma warning(disable:4127) // conditional expression is constant
|
|
RtAssert(FALSE);
|
|
#pragma warning(pop)
|
|
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if(pHeader->iph_ttl < pOutIf->pIpIf->if_mcastttl)
|
|
{
|
|
//
|
|
// TTL would be too low, what do we send back?
|
|
//
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulTtlTooLow));
|
|
|
|
Trace(FWD, WARN,
|
|
("IPMForward: Packet ttl is %d, I/f ttl is %d. Dropping\n",
|
|
pHeader->iph_ttl, pOutIf->pIpIf->if_mcastttl));
|
|
|
|
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// See if we need to filter this
|
|
//
|
|
|
|
if (RefPtrValid(&FilterRefPtr))
|
|
{
|
|
uint InIFIndex = bSendFromQueue ? INVALID_IF_INDEX
|
|
: pPrimarySrcNte->nte_if->if_index;
|
|
//
|
|
// NOTE: We use the same header and data all the time.
|
|
//
|
|
|
|
FilterPtr = AcquireRefPtr(&FilterRefPtr);
|
|
faAction = (*FilterPtr) (pHeader, pvData, uiFirstBufLen,
|
|
InIFIndex, pOutIf->pIpIf->if_index,
|
|
NULL_IP_ADDR, NULL_IP_ADDR);
|
|
ReleaseRefPtr(&FilterRefPtr);
|
|
|
|
if(faAction != FORWARD)
|
|
{
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Filter returned %d\n",
|
|
faAction));
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
|
|
//DerefIF(IF);
|
|
|
|
continue;
|
|
}
|
|
}
|
|
|
|
//
|
|
// TODO Get the primary NTE for this IF.
|
|
// right now we are picking up the first NTE
|
|
//
|
|
|
|
pOutNte = pOutIf->pIpIf->if_nte;
|
|
|
|
if(pOutNte is NULL)
|
|
{
|
|
Trace(FWD, WARN,
|
|
("IPMForward: No NTE found for interface %x (%d)\n",
|
|
pOutIf->pIpIf, pOutIf->pIpIf->if_nte));
|
|
|
|
continue;
|
|
}
|
|
|
|
if(pOutIf->pNextOutIf)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Not the last i/f - need to allocate packets\n"));
|
|
|
|
//
|
|
// Get a plain old header and packet.
|
|
//
|
|
|
|
pNewHeader = GetIPHeader(&pnpNewPacket);
|
|
|
|
if(pNewHeader is NULL)
|
|
{
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: Could not get packet/header\n"));
|
|
|
|
//
|
|
// Could not get a header and packet
|
|
//
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
|
|
continue;
|
|
}
|
|
|
|
|
|
#if MCAST_COMP_DBG
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: New Packet 0x%x New Header 0x%x\n",pnpNewPacket, pNewHeader));
|
|
|
|
#endif
|
|
|
|
//
|
|
// Set the packet context for all packets that are created
|
|
// here to be Non FW packets
|
|
// Note: Earlier we would also set the packet to be IPBUF, but
|
|
// now since we dont allocate buffers and instead just use the
|
|
// original buffers, we MUST not set the IPBUF flag
|
|
//
|
|
|
|
pPC = (PacketContext *)pnpNewPacket->ProtocolReserved;
|
|
|
|
//
|
|
// Copy out the context. STRUCTURE COPY
|
|
//
|
|
|
|
*pPC = pFWC->fc_pc;
|
|
|
|
pPC->PCFLAGS &= ~PACKET_FLAG_FW;
|
|
|
|
//
|
|
// Copy out the header. STRUCTURE COPY
|
|
//
|
|
|
|
*pNewHeader = *pHeader;
|
|
|
|
if(pFWC->fc_options)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: FWC has options at %x. Length %d\n",
|
|
pFWC->fc_options, pFWC->fc_optlength));
|
|
|
|
RtAssert(pFWC->fc_optlength);
|
|
RtAssert(pPC->PCFLAGS & PACKET_FLAG_OPTIONS);
|
|
|
|
//
|
|
// We have options, make a copy.
|
|
//
|
|
|
|
pbyNewOptions = CTEAllocMem(pFWC->fc_optlength);
|
|
|
|
if(pbyNewOptions is NULL)
|
|
{
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: Unable to allocate memory for options\n"));
|
|
|
|
//
|
|
// This gets set during the context copy
|
|
//
|
|
|
|
pPC->PCFLAGS &= ~PACKET_FLAG_OPTIONS;
|
|
|
|
FreeIPPacket(pnpNewPacket, TRUE, IP_NO_RESOURCES);
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
|
|
continue;
|
|
}
|
|
|
|
RtlCopyMemory(pbyNewOptions,
|
|
pFWC->fc_options,
|
|
pFWC->fc_optlength);
|
|
}
|
|
else
|
|
{
|
|
pbyNewOptions = NULL;
|
|
|
|
RtAssert(!(pPC->PCFLAGS & PACKET_FLAG_OPTIONS));
|
|
}
|
|
|
|
// NOT NEEDED - see below
|
|
// CTEGetLockAtDPC(&RouteTableLock);
|
|
//
|
|
// pOutIf->pIpIf->if_refcount++;
|
|
// InterlockedIncrement(&(pOutIf->pIpIf->if_mfwdpktcount));
|
|
//
|
|
// CTEFreeLockFromDPC(&RouteTableLock);
|
|
//
|
|
// pPC->pc_if = pOutIf->pIpIf;
|
|
//
|
|
}
|
|
else
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Last i/f. Using packet 0x%x. Flags 0x%X. Opt 0x%x OptLen %d\n",
|
|
pnpPacket,
|
|
pFWC->FCFLAGS,
|
|
pFWC->fc_options,
|
|
pFWC->fc_optlength));
|
|
|
|
//
|
|
// Use the original packet, header and options
|
|
//
|
|
|
|
pnpNewPacket = pnpPacket;
|
|
pNewHeader = pHeader;
|
|
pbyNewOptions = pFWC->fc_options;
|
|
|
|
// NOT NEEDED - see below
|
|
// CTEGetLockAtDPC(&RouteTableLock);
|
|
//
|
|
// pOutIf->pIpIf->if_refcount++;
|
|
// InterlockedIncrement(&(pOutIf->pIpIf->if_mfwdpktcount));
|
|
//
|
|
// CTEFreeLockFromDPC(&RouteTableLock);
|
|
//
|
|
// pFWC->fc_if = pOutIf->pIpIf;
|
|
//
|
|
}
|
|
|
|
|
|
#if 0
|
|
UpdateOptions(pbyNewOptions,
|
|
pOptIndex,
|
|
pOutNte->nte_addr);
|
|
#endif
|
|
|
|
//
|
|
// Just need to ref across the send, not the send-sendcomplete
|
|
//
|
|
|
|
CTEGetLockAtDPC(&RouteTableLock.Lock);
|
|
|
|
LOCKED_REFERENCE_IF(pOutIf->pIpIf);
|
|
|
|
#ifdef MREF_DEBUG
|
|
InterlockedIncrement(&(pOutIf->pIpIf->if_mfwdpktcount));
|
|
#endif
|
|
CTEFreeLockFromDPC(&RouteTableLock.Lock);
|
|
|
|
if((ulDataLength + pFWC->fc_optlength) > pOutIf->pIpIf->if_mtu)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Data %d Opt %d Hdr %d. MTU %d. Requires frag\n",
|
|
ulDataLength,
|
|
pFWC->fc_optlength,
|
|
sizeof(IPHeader),
|
|
pOutIf->pIpIf->if_mtu));
|
|
|
|
|
|
//
|
|
// This is too big
|
|
// If the numSent variable is null, IPFragment will
|
|
// automatically increment the buffer ref by the sent count
|
|
// We however pass ulSent (THIS MUST BE INITIALIZED TO 0).
|
|
// At the end, we increment it by the
|
|
//
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulFragNeeded));
|
|
|
|
|
|
nsStatus = IPFragment(pOutIf->pIpIf,
|
|
pOutIf->pIpIf->if_mtu - sizeof(IPHeader),
|
|
pOutIf->dwNextHopAddr,
|
|
pnpNewPacket,
|
|
pNewHeader,
|
|
pnbDataBuffer,
|
|
ulDataLength,
|
|
pbyNewOptions,
|
|
pFWC->fc_optlength,
|
|
(PINT) &ulSent,
|
|
TRUE,
|
|
NULL);
|
|
|
|
if((nsStatus isnot STATUS_SUCCESS) and
|
|
(nsStatus isnot IP_PENDING))
|
|
{
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
}
|
|
else
|
|
{
|
|
InterlockedExchangeAdd((PLONG) &(pOutIf->ulOutPackets),
|
|
ulSent);
|
|
|
|
InterlockedExchangeAdd((PLONG) &(pSource->ulTotalOutPackets),
|
|
ulSent);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: No fragmentation needed, sending packet with flags 0x%X\n",
|
|
((PacketContext *)pnpNewPacket->ProtocolReserved)->PCFLAGS));
|
|
//
|
|
// Mark as no loopback
|
|
//
|
|
|
|
NdisSetPacketFlags(pnpNewPacket,
|
|
NDIS_FLAGS_DONT_LOOPBACK);
|
|
|
|
nsStatus = SendIPPacket(pOutIf->pIpIf,
|
|
pOutIf->dwNextHopAddr,
|
|
pnpNewPacket,
|
|
pnbDataBuffer,
|
|
pNewHeader,
|
|
pbyNewOptions,
|
|
pFWC->fc_optlength,
|
|
FALSE,
|
|
NULL,
|
|
FALSE);
|
|
|
|
if((nsStatus isnot STATUS_SUCCESS) and
|
|
(nsStatus isnot IP_PENDING))
|
|
{
|
|
|
|
|
|
Trace(FWD, ERROR,
|
|
("IPMForward: Error 0x%x from SendIPPacket\n",
|
|
nsStatus));
|
|
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutDiscards));
|
|
}
|
|
else
|
|
{
|
|
InterlockedIncrement((PLONG) &(pOutIf->ulOutPackets));
|
|
|
|
InterlockedIncrement((PLONG) &(pSource->ulTotalOutPackets));
|
|
|
|
if(nsStatus is IP_PENDING)
|
|
{
|
|
//
|
|
// The resources allocated in this routine are
|
|
// freed because SendIPPacket calls FreeIPPacket
|
|
// We just need to track if we are done with the
|
|
// original buffer
|
|
//
|
|
|
|
ulSent++;
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef MREF_DEBUG
|
|
InterlockedDecrement(&(pOutIf->pIpIf->if_mfwdpktcount));
|
|
#endif
|
|
DerefIF(pOutIf->pIpIf);
|
|
}
|
|
|
|
DereferenceSource(pSource);
|
|
|
|
//
|
|
// so how many do we have pending?
|
|
//
|
|
|
|
if(ulSent isnot 0)
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: Pending sends %d\n",
|
|
ulSent));
|
|
|
|
//
|
|
// So there were some pending sends (or some
|
|
// fragments)
|
|
//
|
|
|
|
iBufRefCount = ReferenceBuffer(pBuffRef, ulSent);
|
|
|
|
Trace(FWD, INFO,
|
|
("IPMForward: ReferenceBuffer returned %d\n",iBufRefCount));
|
|
|
|
if(iBufRefCount is 0)
|
|
{
|
|
//
|
|
// The sends completed before we got here. But since the
|
|
// refcount would have been negative, the buffer would
|
|
// not have been freed
|
|
//
|
|
|
|
CTEFreeMem(pBuffRef);
|
|
|
|
//
|
|
// Call FWSendComplete on the packet to free up
|
|
// resources
|
|
//
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
|
|
FWSendComplete(pnpPacket,
|
|
pFWC->fc_buffhead, IP_SUCCESS);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Trace(FWD, INFO,
|
|
("IPMForward: There are no pending sends\n"));
|
|
|
|
//
|
|
// NULL out the pc_br so the completion routine does not
|
|
// try to deref it. Also generally clean stuff up
|
|
//
|
|
|
|
((PacketContext *)pnpPacket->ProtocolReserved)->pc_br = NULL;
|
|
|
|
CTEFreeMem(pBuffRef);
|
|
|
|
//
|
|
// No pending sends. There was however a buffref in the
|
|
// FWC, so the packets would not have been freed
|
|
//
|
|
|
|
#if MCAST_BUG_TRACKING
|
|
pFWC->fc_mtu = __LINE__;
|
|
#endif
|
|
FWSendComplete(pnpPacket,
|
|
pFWC->fc_buffhead, IP_SUCCESS);
|
|
}
|
|
|
|
TraceLeave(FWD, "IPMForward");
|
|
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
#endif // IPMCAST
|
|
|