version 1.113, 2011/12/19 11:59:57 |
version 1.132, 2014/07/09 04:54:04 |
|
|
* @(#)raw_ip.c 8.7 (Berkeley) 5/15/95 |
* @(#)raw_ip.c 8.7 (Berkeley) 5/15/95 |
*/ |
*/ |
|
|
|
/* |
|
* Raw interface to IP protocol. |
|
*/ |
|
|
#include <sys/cdefs.h> |
#include <sys/cdefs.h> |
__KERNEL_RCSID(0, "$NetBSD$"); |
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
Line 94 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 98 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet/in_proto.h> |
#include <netinet/in_proto.h> |
#include <netinet/in_var.h> |
#include <netinet/in_var.h> |
|
|
#ifdef KAME_IPSEC |
#ifdef IPSEC |
#include <netinet6/ipsec.h> |
|
#include <netinet6/ipsec_private.h> |
|
#endif /* KAME_IPSEC */ |
|
|
|
#ifdef FAST_IPSEC |
|
#include <netipsec/ipsec.h> |
#include <netipsec/ipsec.h> |
#include <netipsec/ipsec_var.h> |
#include <netipsec/ipsec_var.h> |
#include <netipsec/ipsec_private.h> |
#include <netipsec/ipsec_private.h> |
#endif /* FAST_IPSEC */ |
#endif /* IPSEC */ |
|
|
#ifdef COMPAT_50 |
#ifdef COMPAT_50 |
#include <compat/sys/socket.h> |
#include <compat/sys/socket.h> |
Line 125 static void sysctl_net_inet_raw_setup(st |
|
Line 124 static void sysctl_net_inet_raw_setup(st |
|
#define RIPSNDQ 8192 |
#define RIPSNDQ 8192 |
#define RIPRCVQ 8192 |
#define RIPRCVQ 8192 |
|
|
|
static u_long rip_sendspace = RIPSNDQ; |
|
static u_long rip_recvspace = RIPRCVQ; |
|
|
/* |
/* |
* Raw interface to IP protocol. |
* Raw interface to IP protocol. |
*/ |
*/ |
Line 194 rip_input(struct mbuf *m, ...) |
|
Line 196 rip_input(struct mbuf *m, ...) |
|
ip->ip_len = ntohs(ip->ip_len) - hlen; |
ip->ip_len = ntohs(ip->ip_len) - hlen; |
NTOHS(ip->ip_off); |
NTOHS(ip->ip_off); |
|
|
CIRCLEQ_FOREACH(inph, &rawcbtable.inpt_queue, inph_queue) { |
TAILQ_FOREACH(inph, &rawcbtable.inpt_queue, inph_queue) { |
inp = (struct inpcb *)inph; |
inp = (struct inpcb *)inph; |
if (inp->inp_af != AF_INET) |
if (inp->inp_af != AF_INET) |
continue; |
continue; |
Line 208 rip_input(struct mbuf *m, ...) |
|
Line 210 rip_input(struct mbuf *m, ...) |
|
continue; |
continue; |
if (last == NULL) |
if (last == NULL) |
; |
; |
#if defined(KAME_IPSEC) || defined(FAST_IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
else if (ipsec4_in_reject_so(m, last->inp_socket)) { |
else if (ipsec_used && |
|
ipsec4_in_reject_so(m, last->inp_socket)) { |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
/* do not inject data to pcb */ |
/* do not inject data to pcb */ |
} |
} |
Line 222 rip_input(struct mbuf *m, ...) |
|
Line 225 rip_input(struct mbuf *m, ...) |
|
} |
} |
last = inp; |
last = inp; |
} |
} |
#if defined(KAME_IPSEC) || defined(FAST_IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (last != NULL && ipsec4_in_reject_so(m, last->inp_socket)) { |
if (ipsec_used && last != NULL |
|
&& ipsec4_in_reject_so(m, last->inp_socket)) { |
m_freem(m); |
m_freem(m); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IP_STATDEC(IP_STAT_DELIVERED); |
IP_STATDEC(IP_STAT_DELIVERED); |
Line 252 rip_pcbnotify(struct inpcbtable *table, |
|
Line 256 rip_pcbnotify(struct inpcbtable *table, |
|
struct in_addr faddr, struct in_addr laddr, int proto, int errno, |
struct in_addr faddr, struct in_addr laddr, int proto, int errno, |
void (*notify)(struct inpcb *, int)) |
void (*notify)(struct inpcb *, int)) |
{ |
{ |
struct inpcb *inp, *ninp; |
struct inpcb_hdr *inph, *ninph; |
int nmatch; |
int nmatch; |
|
|
nmatch = 0; |
nmatch = 0; |
for (inp = (struct inpcb *)CIRCLEQ_FIRST(&table->inpt_queue); |
TAILQ_FOREACH_SAFE(inph, &table->inpt_queue, inph_queue, ninph) { |
inp != (struct inpcb *)&table->inpt_queue; |
struct inpcb *inp = (struct inpcb *)inph; |
inp = ninp) { |
|
ninp = (struct inpcb *)inp->inp_queue.cqe_next; |
|
if (inp->inp_af != AF_INET) |
if (inp->inp_af != AF_INET) |
continue; |
continue; |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
Line 381 rip_output(struct mbuf *m, ...) |
|
Line 383 rip_output(struct mbuf *m, ...) |
|
flags |= IP_RAWOUTPUT; |
flags |= IP_RAWOUTPUT; |
IP_STATINC(IP_STAT_RAWOUT); |
IP_STATINC(IP_STAT_RAWOUT); |
} |
} |
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
|
inp->inp_socket, &inp->inp_errormtu)); |
/* |
|
* IP output. Note: if IP_RETURNMTU flag is set, the MTU size |
|
* will be stored in inp_errormtu. |
|
*/ |
|
return ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
|
inp->inp_socket); |
} |
} |
|
|
/* |
/* |
Line 481 rip_bind(struct inpcb *inp, struct mbuf |
|
Line 488 rip_bind(struct inpcb *inp, struct mbuf |
|
|
|
if (nam->m_len != sizeof(*addr)) |
if (nam->m_len != sizeof(*addr)) |
return (EINVAL); |
return (EINVAL); |
if (TAILQ_FIRST(&ifnet) == 0) |
if (!IFNET_FIRST()) |
return (EADDRNOTAVAIL); |
return (EADDRNOTAVAIL); |
if (addr->sin_family != AF_INET && |
if (addr->sin_family != AF_INET) |
addr->sin_family != AF_IMPLINK) |
|
return (EAFNOSUPPORT); |
return (EAFNOSUPPORT); |
if (!in_nullhost(addr->sin_addr) && |
if (!in_nullhost(addr->sin_addr) && |
ifa_ifwithaddr(sintosa(addr)) == 0) |
ifa_ifwithaddr(sintosa(addr)) == 0) |
Line 500 rip_connect(struct inpcb *inp, struct mb |
|
Line 506 rip_connect(struct inpcb *inp, struct mb |
|
|
|
if (nam->m_len != sizeof(*addr)) |
if (nam->m_len != sizeof(*addr)) |
return (EINVAL); |
return (EINVAL); |
if (TAILQ_FIRST(&ifnet) == 0) |
if (!IFNET_FIRST()) |
return (EADDRNOTAVAIL); |
return (EADDRNOTAVAIL); |
if (addr->sin_family != AF_INET && |
if (addr->sin_family != AF_INET) |
addr->sin_family != AF_IMPLINK) |
|
return (EAFNOSUPPORT); |
return (EAFNOSUPPORT); |
inp->inp_faddr = addr->sin_addr; |
inp->inp_faddr = addr->sin_addr; |
return (0); |
return (0); |
Line 516 rip_disconnect(struct inpcb *inp) |
|
Line 521 rip_disconnect(struct inpcb *inp) |
|
inp->inp_faddr = zeroin_addr; |
inp->inp_faddr = zeroin_addr; |
} |
} |
|
|
u_long rip_sendspace = RIPSNDQ; |
static int |
u_long rip_recvspace = RIPRCVQ; |
rip_attach(struct socket *so, int proto) |
|
{ |
|
struct inpcb *inp; |
|
int error; |
|
|
/*ARGSUSED*/ |
KASSERT(sotoinpcb(so) == NULL); |
int |
sosetlock(so); |
rip_usrreq(struct socket *so, int req, |
|
struct mbuf *m, struct mbuf *nam, struct mbuf *control, struct lwp *l) |
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { |
|
error = soreserve(so, rip_sendspace, rip_recvspace); |
|
if (error) { |
|
return error; |
|
} |
|
} |
|
|
|
error = in_pcballoc(so, &rawcbtable); |
|
if (error) { |
|
return error; |
|
} |
|
inp = sotoinpcb(so); |
|
inp->inp_ip.ip_p = proto; |
|
KASSERT(solocked(so)); |
|
|
|
return 0; |
|
} |
|
|
|
static void |
|
rip_detach(struct socket *so) |
{ |
{ |
struct inpcb *inp; |
struct inpcb *inp; |
int s; |
|
int error = 0; |
KASSERT(solocked(so)); |
|
inp = sotoinpcb(so); |
|
KASSERT(inp != NULL); |
|
|
#ifdef MROUTING |
#ifdef MROUTING |
extern struct socket *ip_mrouter; |
extern struct socket *ip_mrouter; |
|
if (so == ip_mrouter) { |
|
ip_mrouter_done(); |
|
} |
#endif |
#endif |
|
in_pcbdetach(inp); |
|
} |
|
|
if (req == PRU_CONTROL) |
static int |
return in_control(so, (long)m, nam, (struct ifnet *)control, l); |
rip_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp) |
|
{ |
|
return in_control(so, cmd, nam, ifp); |
|
} |
|
|
s = splsoftnet(); |
static int |
|
rip_stat(struct socket *so, struct stat *ub) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
|
/* stat: don't bother with a blocksize. */ |
|
return 0; |
|
} |
|
|
|
static int |
|
rip_peeraddr(struct socket *so, struct mbuf *nam) |
|
{ |
|
KASSERT(solocked(0)); |
|
KASSERT(sotoinpcb(so) != NULL); |
|
KASSERT(nam != NULL); |
|
|
|
in_setpeeraddr(sotoinpcb(so), nam); |
|
return 0; |
|
} |
|
|
|
static int |
|
rip_sockaddr(struct socket *so, struct mbuf *nam) |
|
{ |
|
KASSERT(solocked(0)); |
|
KASSERT(sotoinpcb(so) != NULL); |
|
KASSERT(nam != NULL); |
|
|
|
in_setsockaddr(sotoinpcb(so), nam); |
|
return 0; |
|
} |
|
|
|
int |
|
rip_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *nam, |
|
struct mbuf *control, struct lwp *l) |
|
{ |
|
struct inpcb *inp; |
|
int s, error = 0; |
|
|
|
KASSERT(req != PRU_ATTACH); |
|
KASSERT(req != PRU_DETACH); |
|
KASSERT(req != PRU_CONTROL); |
|
KASSERT(req != PRU_SENSE); |
|
KASSERT(req != PRU_PEERADDR); |
|
KASSERT(req != PRU_SOCKADDR); |
|
|
|
s = splsoftnet(); |
if (req == PRU_PURGEIF) { |
if (req == PRU_PURGEIF) { |
mutex_enter(softnet_lock); |
mutex_enter(softnet_lock); |
in_pcbpurgeif0(&rawcbtable, (struct ifnet *)control); |
in_pcbpurgeif0(&rawcbtable, (struct ifnet *)control); |
Line 543 rip_usrreq(struct socket *so, int req, |
|
Line 625 rip_usrreq(struct socket *so, int req, |
|
in_pcbpurgeif(&rawcbtable, (struct ifnet *)control); |
in_pcbpurgeif(&rawcbtable, (struct ifnet *)control); |
mutex_exit(softnet_lock); |
mutex_exit(softnet_lock); |
splx(s); |
splx(s); |
return (0); |
return 0; |
} |
} |
|
|
|
KASSERT(solocked(so)); |
inp = sotoinpcb(so); |
inp = sotoinpcb(so); |
#ifdef DIAGNOSTIC |
|
if (req != PRU_SEND && req != PRU_SENDOOB && control) |
KASSERT(!control || (req == PRU_SEND || req == PRU_SENDOOB)); |
panic("rip_usrreq: unexpected control mbuf"); |
if (inp == NULL) { |
#endif |
splx(s); |
if (inp == NULL && req != PRU_ATTACH) { |
return EINVAL; |
error = EINVAL; |
|
goto release; |
|
} |
} |
|
|
switch (req) { |
switch (req) { |
|
|
case PRU_ATTACH: |
|
sosetlock(so); |
|
if (inp != 0) { |
|
error = EISCONN; |
|
break; |
|
} |
|
|
|
if (l == NULL) { |
|
error = EACCES; |
|
break; |
|
} |
|
|
|
/* XXX: raw socket permissions are checked in socreate() */ |
|
|
|
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { |
|
error = soreserve(so, rip_sendspace, rip_recvspace); |
|
if (error) |
|
break; |
|
} |
|
error = in_pcballoc(so, &rawcbtable); |
|
if (error) |
|
break; |
|
inp = sotoinpcb(so); |
|
inp->inp_ip.ip_p = (long)nam; |
|
break; |
|
|
|
case PRU_DETACH: |
|
#ifdef MROUTING |
|
if (so == ip_mrouter) |
|
ip_mrouter_done(); |
|
#endif |
|
in_pcbdetach(inp); |
|
break; |
|
|
|
case PRU_BIND: |
case PRU_BIND: |
error = rip_bind(inp, nam); |
error = rip_bind(inp, nam); |
break; |
break; |
Line 662 rip_usrreq(struct socket *so, int req, |
|
Line 709 rip_usrreq(struct socket *so, int req, |
|
} |
} |
break; |
break; |
|
|
case PRU_SENSE: |
|
/* |
|
* stat: don't bother with a blocksize. |
|
*/ |
|
splx(s); |
|
return (0); |
|
|
|
case PRU_RCVOOB: |
case PRU_RCVOOB: |
error = EOPNOTSUPP; |
error = EOPNOTSUPP; |
break; |
break; |
Line 679 rip_usrreq(struct socket *so, int req, |
|
Line 719 rip_usrreq(struct socket *so, int req, |
|
error = EOPNOTSUPP; |
error = EOPNOTSUPP; |
break; |
break; |
|
|
case PRU_SOCKADDR: |
|
in_setsockaddr(inp, nam); |
|
break; |
|
|
|
case PRU_PEERADDR: |
|
in_setpeeraddr(inp, nam); |
|
break; |
|
|
|
default: |
default: |
panic("rip_usrreq"); |
panic("rip_usrreq"); |
} |
} |
|
|
release: |
|
splx(s); |
splx(s); |
return (error); |
|
|
return error; |
} |
} |
|
|
|
PR_WRAP_USRREQS(rip) |
|
#define rip_attach rip_attach_wrapper |
|
#define rip_detach rip_detach_wrapper |
|
#define rip_ioctl rip_ioctl_wrapper |
|
#define rip_stat rip_stat_wrapper |
|
#define rip_peeraddr rip_peeraddr_wrapper |
|
#define rip_sockaddr rip_sockaddr_wrapper |
|
#define rip_usrreq rip_usrreq_wrapper |
|
|
|
const struct pr_usrreqs rip_usrreqs = { |
|
.pr_attach = rip_attach, |
|
.pr_detach = rip_detach, |
|
.pr_ioctl = rip_ioctl, |
|
.pr_stat = rip_stat, |
|
.pr_peeraddr = rip_peeraddr, |
|
.pr_sockaddr = rip_sockaddr, |
|
.pr_generic = rip_usrreq, |
|
}; |
|
|
static void |
static void |
sysctl_net_inet_raw_setup(struct sysctllog **clog) |
sysctl_net_inet_raw_setup(struct sysctllog **clog) |
{ |
{ |
|
|
sysctl_createv(clog, 0, NULL, NULL, |
sysctl_createv(clog, 0, NULL, NULL, |
CTLFLAG_PERMANENT, |
CTLFLAG_PERMANENT, |
CTLTYPE_NODE, "net", NULL, |
|
NULL, 0, NULL, 0, |
|
CTL_NET, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT, |
|
CTLTYPE_NODE, "inet", NULL, |
CTLTYPE_NODE, "inet", NULL, |
NULL, 0, NULL, 0, |
NULL, 0, NULL, 0, |
CTL_NET, PF_INET, CTL_EOL); |
CTL_NET, PF_INET, CTL_EOL); |