Date: Thu, 13 Nov 2003 00:43:31 +0100 From: Andre Oppermann <oppermann@pipeline.ch> To: Jesper Skriver <jesper@skriver.dk> Cc: sam@errno.com Subject: Re: tcp hostcache and ip fastforward for review Message-ID: <3FB2C5A3.E6F33B07@pipeline.ch> References: <3FAE68FB.64D262FF@pipeline.ch> <20031112225326.GI41949@FreeBSD.org> <3FB2BE8A.6C880085@pipeline.ch> <20031112232341.GJ41949@skriver.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
Jesper Skriver wrote: > > On Thu, Nov 13, 2003 at 12:13:14AM +0100, Andre Oppermann wrote: > > Jesper Skriver wrote: > > > > > > On Sun, Nov 09, 2003 at 05:19:07PM +0100, Andre Oppermann wrote: > > > > Hello all, > > > > > > > > this patch contains three things (to be separated for committing): > > ... > > > > ip_fastforward > > > > > > > > - removes ip_flow forwarding code > > > > - adds full direct process-to-completion IPv4 forwarding code > > > > - handles ip fragmentation incl. hw support (ip_flow did not) > > > > - supports ipfw and ipfilter (ip_flow did not) > > > > - supports divert and ipfw fwd (ip_flow did not) > > > > - drops anything it can't handle back to normal ip_input > > > > > > I have a few comments to this code, see inline, look for #jesper > > > > Answers also inline. [All whitespace bugs are fixed and omitted here] > > One comment at the bottom. > > > > Apart from that it looks good. > > > > Thanks for reviewing! > > > > > /Jesper > > > > > > > +int > > > > +ip_fastforward(struct mbuf *m) > > > > +{ > > ... > > > > + > > > > + /* > > > > + * Only unicast IP, not from loopback, no L2 or IP broadcast, > > > > + * no multicast, no INADDR_ANY > > > > + */ > > > > + if ((m->m_pkthdr.rcvif->if_flags & IFF_LOOPBACK) || > > > > + (ntohl(ip->ip_src.s_addr) == (u_long)INADDR_BROADCAST) || > > > > > > #jesper > > > You will never see packets with a multicast source address. > > > > I hope so but we can never be sure. Here we look at what we've got > > straight from the wire. Everything is possible there. I only need > > to craft an apropriate packet... > > True, but do we really care if forwarded such a packet ? Yes, never forward anything that should not be. Stop the problem right here instead of letting it become a problem somewhere else. > And if we want to check, we should just drop it directly instead of > giving the packet to ip_input. Makes sense. Can we ever have a packet that has a source address with INADDR_BROADCAST or IN_MULTICAST? I can't think of such a case. Can we ever have a packet with destination address INADDR_ANY? Maybe for BOOTP? But then the source address would be 0.0.0.0 too? With fallback to ip_input() in all those cases I wanted to make sure that I don't break any obscure hack or protocol I didn't think of. -- Andre
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3FB2C5A3.E6F33B07>