version 1.119, 2014/05/18 00:10:11 |
version 1.147, 2015/04/03 20:01:07 |
|
|
* @(#)raw_ip.c 8.7 (Berkeley) 5/15/95 |
* @(#)raw_ip.c 8.7 (Berkeley) 5/15/95 |
*/ |
*/ |
|
|
|
/* |
|
* Raw interface to IP protocol. |
|
*/ |
|
|
#include <sys/cdefs.h> |
#include <sys/cdefs.h> |
__KERNEL_RCSID(0, "$NetBSD$"); |
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
Line 70 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 74 __KERNEL_RCSID(0, "$NetBSD$"); |
|
|
|
#include <sys/param.h> |
#include <sys/param.h> |
#include <sys/sysctl.h> |
#include <sys/sysctl.h> |
#include <sys/malloc.h> |
|
#include <sys/mbuf.h> |
#include <sys/mbuf.h> |
#include <sys/socket.h> |
#include <sys/socket.h> |
#include <sys/protosw.h> |
#include <sys/protosw.h> |
Line 108 struct inpcbtable rawcbtable; |
|
Line 111 struct inpcbtable rawcbtable; |
|
|
|
int rip_pcbnotify(struct inpcbtable *, struct in_addr, |
int rip_pcbnotify(struct inpcbtable *, struct in_addr, |
struct in_addr, int, int, void (*)(struct inpcb *, int)); |
struct in_addr, int, int, void (*)(struct inpcb *, int)); |
int rip_bind(struct inpcb *, struct mbuf *); |
int rip_connect_pcb(struct inpcb *, struct mbuf *); |
int rip_connect(struct inpcb *, struct mbuf *); |
static void rip_disconnect1(struct inpcb *); |
void rip_disconnect(struct inpcb *); |
|
|
|
static void sysctl_net_inet_raw_setup(struct sysctllog **); |
static void sysctl_net_inet_raw_setup(struct sysctllog **); |
|
|
Line 120 static void sysctl_net_inet_raw_setup(st |
|
Line 122 static void sysctl_net_inet_raw_setup(st |
|
#define RIPSNDQ 8192 |
#define RIPSNDQ 8192 |
#define RIPRCVQ 8192 |
#define RIPRCVQ 8192 |
|
|
|
static u_long rip_sendspace = RIPSNDQ; |
|
static u_long rip_recvspace = RIPRCVQ; |
|
|
/* |
/* |
* Raw interface to IP protocol. |
* Raw interface to IP protocol. |
*/ |
*/ |
Line 205 rip_input(struct mbuf *m, ...) |
|
Line 210 rip_input(struct mbuf *m, ...) |
|
; |
; |
#if defined(IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
else if (ipsec4_in_reject_so(m, last->inp_socket)) { |
else if (ipsec_used && |
|
ipsec4_in_reject_so(m, last->inp_socket)) { |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
/* do not inject data to pcb */ |
/* do not inject data to pcb */ |
} |
} |
Line 219 rip_input(struct mbuf *m, ...) |
|
Line 225 rip_input(struct mbuf *m, ...) |
|
} |
} |
#if defined(IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (last != NULL && ipsec4_in_reject_so(m, last->inp_socket)) { |
if (ipsec_used && last != NULL |
|
&& ipsec4_in_reject_so(m, last->inp_socket)) { |
m_freem(m); |
m_freem(m); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
IP_STATDEC(IP_STAT_DELIVERED); |
IP_STATDEC(IP_STAT_DELIVERED); |
Line 374 rip_output(struct mbuf *m, ...) |
|
Line 381 rip_output(struct mbuf *m, ...) |
|
flags |= IP_RAWOUTPUT; |
flags |= IP_RAWOUTPUT; |
IP_STATINC(IP_STAT_RAWOUT); |
IP_STATINC(IP_STAT_RAWOUT); |
} |
} |
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
|
inp->inp_socket, &inp->inp_errormtu)); |
/* |
|
* IP output. Note: if IP_RETURNMTU flag is set, the MTU size |
|
* will be stored in inp_errormtu. |
|
*/ |
|
return ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
|
inp->inp_socket); |
} |
} |
|
|
/* |
/* |
Line 468 rip_ctloutput(int op, struct socket *so, |
|
Line 480 rip_ctloutput(int op, struct socket *so, |
|
} |
} |
|
|
int |
int |
rip_bind(struct inpcb *inp, struct mbuf *nam) |
rip_connect_pcb(struct inpcb *inp, struct mbuf *nam) |
{ |
{ |
struct sockaddr_in *addr = mtod(nam, struct sockaddr_in *); |
struct sockaddr_in *addr = mtod(nam, struct sockaddr_in *); |
|
|
if (nam->m_len != sizeof(*addr)) |
if (nam->m_len != sizeof(*addr)) |
return (EINVAL); |
return (EINVAL); |
if (!IFNET_FIRST()) |
if (IFNET_EMPTY()) |
return (EADDRNOTAVAIL); |
return (EADDRNOTAVAIL); |
if (addr->sin_family != AF_INET) |
if (addr->sin_family != AF_INET) |
return (EAFNOSUPPORT); |
return (EAFNOSUPPORT); |
if (!in_nullhost(addr->sin_addr) && |
inp->inp_faddr = addr->sin_addr; |
ifa_ifwithaddr(sintosa(addr)) == 0) |
|
return (EADDRNOTAVAIL); |
|
inp->inp_laddr = addr->sin_addr; |
|
return (0); |
return (0); |
} |
} |
|
|
int |
static void |
rip_connect(struct inpcb *inp, struct mbuf *nam) |
rip_disconnect1(struct inpcb *inp) |
{ |
{ |
struct sockaddr_in *addr = mtod(nam, struct sockaddr_in *); |
|
|
|
if (nam->m_len != sizeof(*addr)) |
inp->inp_faddr = zeroin_addr; |
return (EINVAL); |
|
if (!IFNET_FIRST()) |
|
return (EADDRNOTAVAIL); |
|
if (addr->sin_family != AF_INET) |
|
return (EAFNOSUPPORT); |
|
inp->inp_faddr = addr->sin_addr; |
|
return (0); |
|
} |
} |
|
|
void |
static int |
rip_disconnect(struct inpcb *inp) |
rip_attach(struct socket *so, int proto) |
{ |
{ |
|
struct inpcb *inp; |
|
int error; |
|
|
inp->inp_faddr = zeroin_addr; |
KASSERT(sotoinpcb(so) == NULL); |
} |
sosetlock(so); |
|
|
u_long rip_sendspace = RIPSNDQ; |
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { |
u_long rip_recvspace = RIPRCVQ; |
error = soreserve(so, rip_sendspace, rip_recvspace); |
|
if (error) { |
|
return error; |
|
} |
|
} |
|
|
/*ARGSUSED*/ |
error = in_pcballoc(so, &rawcbtable); |
int |
if (error) { |
rip_usrreq(struct socket *so, int req, |
return error; |
struct mbuf *m, struct mbuf *nam, struct mbuf *control, struct lwp *l) |
} |
|
inp = sotoinpcb(so); |
|
inp->inp_ip.ip_p = proto; |
|
KASSERT(solocked(so)); |
|
|
|
return 0; |
|
} |
|
|
|
static void |
|
rip_detach(struct socket *so) |
{ |
{ |
struct inpcb *inp; |
struct inpcb *inp; |
int s; |
|
int error = 0; |
KASSERT(solocked(so)); |
|
inp = sotoinpcb(so); |
|
KASSERT(inp != NULL); |
|
|
#ifdef MROUTING |
#ifdef MROUTING |
extern struct socket *ip_mrouter; |
extern struct socket *ip_mrouter; |
|
if (so == ip_mrouter) { |
|
ip_mrouter_done(); |
|
} |
#endif |
#endif |
|
in_pcbdetach(inp); |
|
} |
|
|
if (req == PRU_CONTROL) |
static int |
return in_control(so, (long)m, nam, (struct ifnet *)control, l); |
rip_accept(struct socket *so, struct mbuf *nam) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
s = splsoftnet(); |
panic("rip_accept"); |
|
|
if (req == PRU_PURGEIF) { |
return EOPNOTSUPP; |
mutex_enter(softnet_lock); |
} |
in_pcbpurgeif0(&rawcbtable, (struct ifnet *)control); |
|
in_purgeif((struct ifnet *)control); |
|
in_pcbpurgeif(&rawcbtable, (struct ifnet *)control); |
|
mutex_exit(softnet_lock); |
|
splx(s); |
|
return (0); |
|
} |
|
|
|
inp = sotoinpcb(so); |
static int |
#ifdef DIAGNOSTIC |
rip_bind(struct socket *so, struct sockaddr *nam, struct lwp *l) |
if (req != PRU_SEND && req != PRU_SENDOOB && control) |
{ |
panic("rip_usrreq: unexpected control mbuf"); |
struct inpcb *inp = sotoinpcb(so); |
#endif |
struct sockaddr_in *addr = (struct sockaddr_in *)nam; |
if (inp == NULL && req != PRU_ATTACH) { |
int error = 0; |
error = EINVAL; |
int s; |
|
|
|
KASSERT(solocked(so)); |
|
KASSERT(inp != NULL); |
|
KASSERT(nam != NULL); |
|
|
|
if (addr->sin_len != sizeof(*addr)) |
|
return EINVAL; |
|
|
|
s = splsoftnet(); |
|
if (IFNET_EMPTY()) { |
|
error = EADDRNOTAVAIL; |
|
goto release; |
|
} |
|
if (addr->sin_family != AF_INET) { |
|
error = EAFNOSUPPORT; |
|
goto release; |
|
} |
|
if (!in_nullhost(addr->sin_addr) && |
|
ifa_ifwithaddr(sintosa(addr)) == 0) { |
|
error = EADDRNOTAVAIL; |
goto release; |
goto release; |
} |
} |
|
inp->inp_laddr = addr->sin_addr; |
|
|
switch (req) { |
release: |
|
splx(s); |
|
return error; |
|
} |
|
|
case PRU_ATTACH: |
static int |
sosetlock(so); |
rip_listen(struct socket *so, struct lwp *l) |
if (inp != 0) { |
{ |
error = EISCONN; |
KASSERT(solocked(so)); |
break; |
|
} |
|
|
|
if (l == NULL) { |
return EOPNOTSUPP; |
error = EACCES; |
} |
break; |
|
} |
|
|
|
/* XXX: raw socket permissions are checked in socreate() */ |
static int |
|
rip_connect(struct socket *so, struct mbuf *nam, struct lwp *l) |
|
{ |
|
struct inpcb *inp = sotoinpcb(so); |
|
int error = 0; |
|
int s; |
|
|
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { |
KASSERT(solocked(so)); |
error = soreserve(so, rip_sendspace, rip_recvspace); |
KASSERT(inp != NULL); |
if (error) |
KASSERT(nam != NULL); |
break; |
|
} |
|
error = in_pcballoc(so, &rawcbtable); |
|
if (error) |
|
break; |
|
inp = sotoinpcb(so); |
|
inp->inp_ip.ip_p = (long)nam; |
|
break; |
|
|
|
case PRU_DETACH: |
s = splsoftnet(); |
#ifdef MROUTING |
error = rip_connect_pcb(inp, nam); |
if (so == ip_mrouter) |
if (! error) |
ip_mrouter_done(); |
soisconnected(so); |
#endif |
splx(s); |
in_pcbdetach(inp); |
|
break; |
|
|
|
case PRU_BIND: |
return error; |
error = rip_bind(inp, nam); |
} |
break; |
|
|
|
case PRU_LISTEN: |
static int |
error = EOPNOTSUPP; |
rip_connect2(struct socket *so, struct socket *so2) |
break; |
{ |
|
KASSERT(solocked(so)); |
|
|
case PRU_CONNECT: |
return EOPNOTSUPP; |
error = rip_connect(inp, nam); |
} |
if (error) |
|
break; |
|
soisconnected(so); |
|
break; |
|
|
|
case PRU_CONNECT2: |
static int |
error = EOPNOTSUPP; |
rip_disconnect(struct socket *so) |
break; |
{ |
|
struct inpcb *inp = sotoinpcb(so); |
|
int s; |
|
|
case PRU_DISCONNECT: |
KASSERT(solocked(so)); |
soisdisconnected(so); |
KASSERT(inp != NULL); |
rip_disconnect(inp); |
|
break; |
s = splsoftnet(); |
|
soisdisconnected(so); |
|
rip_disconnect1(inp); |
|
splx(s); |
|
|
|
return 0; |
|
} |
|
|
|
static int |
|
rip_shutdown(struct socket *so) |
|
{ |
|
int s; |
|
|
|
KASSERT(solocked(so)); |
|
|
/* |
/* |
* Mark the connection as being incapable of further input. |
* Mark the connection as being incapable of further input. |
*/ |
*/ |
case PRU_SHUTDOWN: |
s = splsoftnet(); |
socantsendmore(so); |
socantsendmore(so); |
break; |
splx(s); |
|
|
case PRU_RCVD: |
return 0; |
error = EOPNOTSUPP; |
} |
break; |
|
|
static int |
|
rip_abort(struct socket *so) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
|
panic("rip_abort"); |
|
|
|
return EOPNOTSUPP; |
|
} |
|
|
|
static int |
|
rip_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp) |
|
{ |
|
return in_control(so, cmd, nam, ifp); |
|
} |
|
|
|
static int |
|
rip_stat(struct socket *so, struct stat *ub) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
|
/* stat: don't bother with a blocksize. */ |
|
return 0; |
|
} |
|
|
|
static int |
|
rip_peeraddr(struct socket *so, struct mbuf *nam) |
|
{ |
|
int s; |
|
|
|
KASSERT(solocked(so)); |
|
KASSERT(sotoinpcb(so) != NULL); |
|
KASSERT(nam != NULL); |
|
|
|
s = splsoftnet(); |
|
in_setpeeraddr(sotoinpcb(so), nam); |
|
splx(s); |
|
|
|
return 0; |
|
} |
|
|
|
static int |
|
rip_sockaddr(struct socket *so, struct mbuf *nam) |
|
{ |
|
int s; |
|
|
|
KASSERT(solocked(so)); |
|
KASSERT(sotoinpcb(so) != NULL); |
|
KASSERT(nam != NULL); |
|
|
|
s = splsoftnet(); |
|
in_setsockaddr(sotoinpcb(so), nam); |
|
splx(s); |
|
|
|
return 0; |
|
} |
|
|
|
static int |
|
rip_rcvd(struct socket *so, int flags, struct lwp *l) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
|
return EOPNOTSUPP; |
|
} |
|
|
|
static int |
|
rip_recvoob(struct socket *so, struct mbuf *m, int flags) |
|
{ |
|
KASSERT(solocked(so)); |
|
|
|
return EOPNOTSUPP; |
|
} |
|
|
|
static int |
|
rip_send(struct socket *so, struct mbuf *m, struct mbuf *nam, |
|
struct mbuf *control, struct lwp *l) |
|
{ |
|
struct inpcb *inp = sotoinpcb(so); |
|
int error = 0; |
|
int s; |
|
|
|
KASSERT(solocked(so)); |
|
KASSERT(inp != NULL); |
|
KASSERT(m != NULL); |
|
|
/* |
/* |
* Ship a packet out. The appropriate raw output |
* Ship a packet out. The appropriate raw output |
* routine handles any massaging necessary. |
* routine handles any massaging necessary. |
*/ |
*/ |
case PRU_SEND: |
if (control && control->m_len) { |
if (control && control->m_len) { |
m_freem(control); |
m_freem(control); |
m_freem(m); |
|
return EINVAL; |
|
} |
|
|
|
s = splsoftnet(); |
|
if (nam) { |
|
if ((so->so_state & SS_ISCONNECTED) != 0) { |
|
error = EISCONN; |
|
goto die; |
|
} |
|
error = rip_connect_pcb(inp, nam); |
|
if (error) { |
|
die: |
m_freem(m); |
m_freem(m); |
error = EINVAL; |
splx(s); |
break; |
return error; |
|
} |
|
} else { |
|
if ((so->so_state & SS_ISCONNECTED) == 0) { |
|
error = ENOTCONN; |
|
goto die; |
} |
} |
{ |
|
if (nam) { |
|
if ((so->so_state & SS_ISCONNECTED) != 0) { |
|
error = EISCONN; |
|
goto die; |
|
} |
|
error = rip_connect(inp, nam); |
|
if (error) { |
|
die: |
|
m_freem(m); |
|
break; |
|
} |
|
} else { |
|
if ((so->so_state & SS_ISCONNECTED) == 0) { |
|
error = ENOTCONN; |
|
goto die; |
|
} |
|
} |
|
error = rip_output(m, inp); |
|
if (nam) |
|
rip_disconnect(inp); |
|
} |
} |
break; |
error = rip_output(m, inp); |
|
if (nam) |
case PRU_SENSE: |
rip_disconnect1(inp); |
/* |
|
* stat: don't bother with a blocksize. |
|
*/ |
|
splx(s); |
|
return (0); |
|
|
|
case PRU_RCVOOB: |
splx(s); |
error = EOPNOTSUPP; |
return error; |
break; |
} |
|
|
case PRU_SENDOOB: |
static int |
m_freem(control); |
rip_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control) |
m_freem(m); |
{ |
error = EOPNOTSUPP; |
KASSERT(solocked(so)); |
break; |
|
|
|
case PRU_SOCKADDR: |
m_freem(m); |
in_setsockaddr(inp, nam); |
m_freem(control); |
break; |
|
|
|
case PRU_PEERADDR: |
return EOPNOTSUPP; |
in_setpeeraddr(inp, nam); |
} |
break; |
|
|
|
default: |
static int |
panic("rip_usrreq"); |
rip_purgeif(struct socket *so, struct ifnet *ifp) |
} |
{ |
|
int s; |
|
|
release: |
s = splsoftnet(); |
|
mutex_enter(softnet_lock); |
|
in_pcbpurgeif0(&rawcbtable, ifp); |
|
in_purgeif(ifp); |
|
in_pcbpurgeif(&rawcbtable, ifp); |
|
mutex_exit(softnet_lock); |
splx(s); |
splx(s); |
return (error); |
|
|
return 0; |
} |
} |
|
|
|
int |
|
rip_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *nam, |
|
struct mbuf *control, struct lwp *l) |
|
{ |
|
KASSERT(req != PRU_ATTACH); |
|
KASSERT(req != PRU_DETACH); |
|
KASSERT(req != PRU_ACCEPT); |
|
KASSERT(req != PRU_BIND); |
|
KASSERT(req != PRU_LISTEN); |
|
KASSERT(req != PRU_CONNECT); |
|
KASSERT(req != PRU_CONNECT2); |
|
KASSERT(req != PRU_DISCONNECT); |
|
KASSERT(req != PRU_SHUTDOWN); |
|
KASSERT(req != PRU_ABORT); |
|
KASSERT(req != PRU_CONTROL); |
|
KASSERT(req != PRU_SENSE); |
|
KASSERT(req != PRU_PEERADDR); |
|
KASSERT(req != PRU_SOCKADDR); |
|
KASSERT(req != PRU_RCVD); |
|
KASSERT(req != PRU_RCVOOB); |
|
KASSERT(req != PRU_SEND); |
|
KASSERT(req != PRU_SENDOOB); |
|
KASSERT(req != PRU_PURGEIF); |
|
|
|
KASSERT(solocked(so)); |
|
|
|
if (sotoinpcb(so) == NULL) |
|
return EINVAL; |
|
|
|
panic("rip_usrreq"); |
|
|
|
return 0; |
|
} |
|
|
|
PR_WRAP_USRREQS(rip) |
|
#define rip_attach rip_attach_wrapper |
|
#define rip_detach rip_detach_wrapper |
|
#define rip_accept rip_accept_wrapper |
|
#define rip_bind rip_bind_wrapper |
|
#define rip_listen rip_listen_wrapper |
|
#define rip_connect rip_connect_wrapper |
|
#define rip_connect2 rip_connect2_wrapper |
|
#define rip_disconnect rip_disconnect_wrapper |
|
#define rip_shutdown rip_shutdown_wrapper |
|
#define rip_abort rip_abort_wrapper |
|
#define rip_ioctl rip_ioctl_wrapper |
|
#define rip_stat rip_stat_wrapper |
|
#define rip_peeraddr rip_peeraddr_wrapper |
|
#define rip_sockaddr rip_sockaddr_wrapper |
|
#define rip_rcvd rip_rcvd_wrapper |
|
#define rip_recvoob rip_recvoob_wrapper |
|
#define rip_send rip_send_wrapper |
|
#define rip_sendoob rip_sendoob_wrapper |
|
#define rip_purgeif rip_purgeif_wrapper |
|
#define rip_usrreq rip_usrreq_wrapper |
|
|
|
const struct pr_usrreqs rip_usrreqs = { |
|
.pr_attach = rip_attach, |
|
.pr_detach = rip_detach, |
|
.pr_accept = rip_accept, |
|
.pr_bind = rip_bind, |
|
.pr_listen = rip_listen, |
|
.pr_connect = rip_connect, |
|
.pr_connect2 = rip_connect2, |
|
.pr_disconnect = rip_disconnect, |
|
.pr_shutdown = rip_shutdown, |
|
.pr_abort = rip_abort, |
|
.pr_ioctl = rip_ioctl, |
|
.pr_stat = rip_stat, |
|
.pr_peeraddr = rip_peeraddr, |
|
.pr_sockaddr = rip_sockaddr, |
|
.pr_rcvd = rip_rcvd, |
|
.pr_recvoob = rip_recvoob, |
|
.pr_send = rip_send, |
|
.pr_sendoob = rip_sendoob, |
|
.pr_purgeif = rip_purgeif, |
|
.pr_generic = rip_usrreq, |
|
}; |
|
|
static void |
static void |
sysctl_net_inet_raw_setup(struct sysctllog **clog) |
sysctl_net_inet_raw_setup(struct sysctllog **clog) |
{ |
{ |