1 /* $NetBSD: in_pcb.c,v 1.163 2016/02/15 14:59:03 rtr Exp $ */ 2 3 /* 4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the project nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 /*- 33 * Copyright (c) 1998, 2011 The NetBSD Foundation, Inc. 34 * All rights reserved. 35 * 36 * This code is derived from software contributed to The NetBSD Foundation 37 * by Coyote Point Systems, Inc. 38 * This code is derived from software contributed to The NetBSD Foundation 39 * by Public Access Networks Corporation ("Panix"). It was developed under 40 * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon. 41 * 42 * Redistribution and use in source and binary forms, with or without 43 * modification, are permitted provided that the following conditions 44 * are met: 45 * 1. Redistributions of source code must retain the above copyright 46 * notice, this list of conditions and the following disclaimer. 47 * 2. Redistributions in binary form must reproduce the above copyright 48 * notice, this list of conditions and the following disclaimer in the 49 * documentation and/or other materials provided with the distribution. 50 * 51 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 52 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 53 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 54 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 55 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 56 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 57 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 58 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 59 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 60 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 61 * POSSIBILITY OF SUCH DAMAGE. 62 */ 63 64 /* 65 * Copyright (c) 1982, 1986, 1991, 1993, 1995 66 * The Regents of the University of California. All rights reserved. 67 * 68 * Redistribution and use in source and binary forms, with or without 69 * modification, are permitted provided that the following conditions 70 * are met: 71 * 1. Redistributions of source code must retain the above copyright 72 * notice, this list of conditions and the following disclaimer. 73 * 2. Redistributions in binary form must reproduce the above copyright 74 * notice, this list of conditions and the following disclaimer in the 75 * documentation and/or other materials provided with the distribution. 76 * 3. Neither the name of the University nor the names of its contributors 77 * may be used to endorse or promote products derived from this software 78 * without specific prior written permission. 79 * 80 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 81 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 82 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 83 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 84 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 85 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 86 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 87 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 88 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 89 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 90 * SUCH DAMAGE. 91 * 92 * @(#)in_pcb.c 8.4 (Berkeley) 5/24/95 93 */ 94 95 #include <sys/cdefs.h> 96 __KERNEL_RCSID(0, "$NetBSD: in_pcb.c,v 1.163 2016/02/15 14:59:03 rtr Exp $"); 97 98 #ifdef _KERNEL_OPT 99 #include "opt_inet.h" 100 #include "opt_ipsec.h" 101 #endif 102 103 #include <sys/param.h> 104 #include <sys/systm.h> 105 #include <sys/mbuf.h> 106 #include <sys/protosw.h> 107 #include <sys/socket.h> 108 #include <sys/socketvar.h> 109 #include <sys/ioctl.h> 110 #include <sys/errno.h> 111 #include <sys/time.h> 112 #include <sys/once.h> 113 #include <sys/pool.h> 114 #include <sys/proc.h> 115 #include <sys/kauth.h> 116 #include <sys/uidinfo.h> 117 #include <sys/domain.h> 118 119 #include <net/if.h> 120 #include <net/route.h> 121 122 #include <netinet/in.h> 123 #include <netinet/in_systm.h> 124 #include <netinet/ip.h> 125 #include <netinet/in_pcb.h> 126 #include <netinet/in_var.h> 127 #include <netinet/ip_var.h> 128 #include <netinet/portalgo.h> 129 130 #ifdef INET6 131 #include <netinet/ip6.h> 132 #include <netinet6/ip6_var.h> 133 #include <netinet6/in6_pcb.h> 134 #endif 135 136 #ifdef IPSEC 137 #include <netipsec/ipsec.h> 138 #include <netipsec/key.h> 139 #endif /* IPSEC */ 140 141 #include <netinet/tcp_vtw.h> 142 143 struct in_addr zeroin_addr; 144 145 #define INPCBHASH_PORT(table, lport) \ 146 &(table)->inpt_porthashtbl[ntohs(lport) & (table)->inpt_porthash] 147 #define INPCBHASH_BIND(table, laddr, lport) \ 148 &(table)->inpt_bindhashtbl[ \ 149 ((ntohl((laddr).s_addr) + ntohs(lport))) & (table)->inpt_bindhash] 150 #define INPCBHASH_CONNECT(table, faddr, fport, laddr, lport) \ 151 &(table)->inpt_connecthashtbl[ \ 152 ((ntohl((faddr).s_addr) + ntohs(fport)) + \ 153 (ntohl((laddr).s_addr) + ntohs(lport))) & (table)->inpt_connecthash] 154 155 int anonportmin = IPPORT_ANONMIN; 156 int anonportmax = IPPORT_ANONMAX; 157 int lowportmin = IPPORT_RESERVEDMIN; 158 int lowportmax = IPPORT_RESERVEDMAX; 159 160 static struct pool inpcb_pool; 161 162 static int 163 inpcb_poolinit(void) 164 { 165 166 pool_init(&inpcb_pool, sizeof(struct inpcb), 0, 0, 0, "inpcbpl", NULL, 167 IPL_NET); 168 return 0; 169 } 170 171 void 172 in_pcbinit(struct inpcbtable *table, int bindhashsize, int connecthashsize) 173 { 174 static ONCE_DECL(control); 175 176 TAILQ_INIT(&table->inpt_queue); 177 table->inpt_porthashtbl = hashinit(bindhashsize, HASH_LIST, true, 178 &table->inpt_porthash); 179 table->inpt_bindhashtbl = hashinit(bindhashsize, HASH_LIST, true, 180 &table->inpt_bindhash); 181 table->inpt_connecthashtbl = hashinit(connecthashsize, HASH_LIST, true, 182 &table->inpt_connecthash); 183 table->inpt_lastlow = IPPORT_RESERVEDMAX; 184 table->inpt_lastport = (u_int16_t)anonportmax; 185 186 RUN_ONCE(&control, inpcb_poolinit); 187 } 188 189 int 190 in_pcballoc(struct socket *so, void *v) 191 { 192 struct inpcbtable *table = v; 193 struct inpcb *inp; 194 int s; 195 196 s = splnet(); 197 inp = pool_get(&inpcb_pool, PR_NOWAIT); 198 splx(s); 199 if (inp == NULL) 200 return (ENOBUFS); 201 memset(inp, 0, sizeof(*inp)); 202 inp->inp_af = AF_INET; 203 inp->inp_table = table; 204 inp->inp_socket = so; 205 inp->inp_errormtu = -1; 206 inp->inp_portalgo = PORTALGO_DEFAULT; 207 inp->inp_bindportonsend = false; 208 #if defined(IPSEC) 209 if (ipsec_enabled) { 210 int error = ipsec_init_pcbpolicy(so, &inp->inp_sp); 211 if (error != 0) { 212 s = splnet(); 213 pool_put(&inpcb_pool, inp); 214 splx(s); 215 return error; 216 } 217 } 218 #endif 219 so->so_pcb = inp; 220 s = splnet(); 221 TAILQ_INSERT_HEAD(&table->inpt_queue, &inp->inp_head, inph_queue); 222 LIST_INSERT_HEAD(INPCBHASH_PORT(table, inp->inp_lport), &inp->inp_head, 223 inph_lhash); 224 in_pcbstate(inp, INP_ATTACHED); 225 splx(s); 226 return (0); 227 } 228 229 static int 230 in_pcbsetport(struct sockaddr_in *sin, struct inpcb *inp, kauth_cred_t cred) 231 { 232 struct inpcbtable *table = inp->inp_table; 233 struct socket *so = inp->inp_socket; 234 u_int16_t *lastport; 235 u_int16_t lport = 0; 236 enum kauth_network_req req; 237 int error; 238 239 if (inp->inp_flags & INP_LOWPORT) { 240 #ifndef IPNOPRIVPORTS 241 req = KAUTH_REQ_NETWORK_BIND_PRIVPORT; 242 #else 243 req = KAUTH_REQ_NETWORK_BIND_PORT; 244 #endif 245 246 lastport = &table->inpt_lastlow; 247 } else { 248 req = KAUTH_REQ_NETWORK_BIND_PORT; 249 250 lastport = &table->inpt_lastport; 251 } 252 253 /* XXX-kauth: KAUTH_REQ_NETWORK_BIND_AUTOASSIGN_{,PRIV}PORT */ 254 error = kauth_authorize_network(cred, KAUTH_NETWORK_BIND, req, so, sin, 255 NULL); 256 if (error) 257 return (EACCES); 258 259 /* 260 * Use RFC6056 randomized port selection 261 */ 262 error = portalgo_randport(&lport, &inp->inp_head, cred); 263 if (error) 264 return error; 265 266 inp->inp_flags |= INP_ANONPORT; 267 *lastport = lport; 268 lport = htons(lport); 269 inp->inp_lport = lport; 270 in_pcbstate(inp, INP_BOUND); 271 272 return (0); 273 } 274 275 static int 276 in_pcbbind_addr(struct inpcb *inp, struct sockaddr_in *sin, kauth_cred_t cred) 277 { 278 if (sin->sin_family != AF_INET) 279 return (EAFNOSUPPORT); 280 281 if (IN_MULTICAST(sin->sin_addr.s_addr)) { 282 /* Always succeed; port reuse handled in in_pcbbind_port(). */ 283 } else if (!in_nullhost(sin->sin_addr)) { 284 struct in_ifaddr *ia = NULL; 285 286 INADDR_TO_IA(sin->sin_addr, ia); 287 /* check for broadcast addresses */ 288 if (ia == NULL) 289 ia = ifatoia(ifa_ifwithaddr(sintosa(sin))); 290 if (ia == NULL) 291 return (EADDRNOTAVAIL); 292 if (ia->ia4_flags & (IN_IFF_NOTREADY | IN_IFF_DETACHED)) 293 return (EADDRNOTAVAIL); 294 } 295 296 inp->inp_laddr = sin->sin_addr; 297 298 return (0); 299 } 300 301 static int 302 in_pcbbind_port(struct inpcb *inp, struct sockaddr_in *sin, kauth_cred_t cred) 303 { 304 struct inpcbtable *table = inp->inp_table; 305 struct socket *so = inp->inp_socket; 306 int reuseport = (so->so_options & SO_REUSEPORT); 307 int wild = 0, error; 308 309 if (IN_MULTICAST(sin->sin_addr.s_addr)) { 310 /* 311 * Treat SO_REUSEADDR as SO_REUSEPORT for multicast; 312 * allow complete duplication of binding if 313 * SO_REUSEPORT is set, or if SO_REUSEADDR is set 314 * and a multicast address is bound on both 315 * new and duplicated sockets. 316 */ 317 if (so->so_options & (SO_REUSEADDR | SO_REUSEPORT)) 318 reuseport = SO_REUSEADDR|SO_REUSEPORT; 319 } 320 321 if (sin->sin_port == 0) { 322 error = in_pcbsetport(sin, inp, cred); 323 if (error) 324 return (error); 325 } else { 326 struct inpcb *t; 327 vestigial_inpcb_t vestige; 328 #ifdef INET6 329 struct in6pcb *t6; 330 struct in6_addr mapped; 331 #endif 332 enum kauth_network_req req; 333 334 if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0) 335 wild = 1; 336 337 #ifndef IPNOPRIVPORTS 338 if (ntohs(sin->sin_port) < IPPORT_RESERVED) 339 req = KAUTH_REQ_NETWORK_BIND_PRIVPORT; 340 else 341 #endif /* !IPNOPRIVPORTS */ 342 req = KAUTH_REQ_NETWORK_BIND_PORT; 343 344 error = kauth_authorize_network(cred, KAUTH_NETWORK_BIND, req, 345 so, sin, NULL); 346 if (error) 347 return (EACCES); 348 349 #ifdef INET6 350 in6_in_2_v4mapin6(&sin->sin_addr, &mapped); 351 t6 = in6_pcblookup_port(table, &mapped, sin->sin_port, wild, &vestige); 352 if (t6 && (reuseport & t6->in6p_socket->so_options) == 0) 353 return (EADDRINUSE); 354 if (!t6 && vestige.valid) { 355 if (!!reuseport != !!vestige.reuse_port) { 356 return EADDRINUSE; 357 } 358 } 359 #endif 360 361 /* XXX-kauth */ 362 if (so->so_uidinfo->ui_uid && !IN_MULTICAST(sin->sin_addr.s_addr)) { 363 t = in_pcblookup_port(table, sin->sin_addr, sin->sin_port, 1, &vestige); 364 /* 365 * XXX: investigate ramifications of loosening this 366 * restriction so that as long as both ports have 367 * SO_REUSEPORT allow the bind 368 */ 369 if (t && 370 (!in_nullhost(sin->sin_addr) || 371 !in_nullhost(t->inp_laddr) || 372 (t->inp_socket->so_options & SO_REUSEPORT) == 0) 373 && (so->so_uidinfo->ui_uid != t->inp_socket->so_uidinfo->ui_uid)) { 374 return (EADDRINUSE); 375 } 376 if (!t && vestige.valid) { 377 if ((!in_nullhost(sin->sin_addr) 378 || !in_nullhost(vestige.laddr.v4) 379 || !vestige.reuse_port) 380 && so->so_uidinfo->ui_uid != vestige.uid) { 381 return EADDRINUSE; 382 } 383 } 384 } 385 t = in_pcblookup_port(table, sin->sin_addr, sin->sin_port, wild, &vestige); 386 if (t && (reuseport & t->inp_socket->so_options) == 0) 387 return (EADDRINUSE); 388 if (!t 389 && vestige.valid 390 && !(reuseport && vestige.reuse_port)) 391 return EADDRINUSE; 392 393 inp->inp_lport = sin->sin_port; 394 in_pcbstate(inp, INP_BOUND); 395 } 396 397 LIST_REMOVE(&inp->inp_head, inph_lhash); 398 LIST_INSERT_HEAD(INPCBHASH_PORT(table, inp->inp_lport), &inp->inp_head, 399 inph_lhash); 400 401 return (0); 402 } 403 404 int 405 in_pcbbind(void *v, struct sockaddr_in *sin, struct lwp *l) 406 { 407 struct inpcb *inp = v; 408 struct sockaddr_in lsin; 409 int error; 410 411 if (inp->inp_af != AF_INET) 412 return (EINVAL); 413 414 if (TAILQ_FIRST(&in_ifaddrhead) == 0) 415 return (EADDRNOTAVAIL); 416 if (inp->inp_lport || !in_nullhost(inp->inp_laddr)) 417 return (EINVAL); 418 419 if (NULL != sin) { 420 if (sin->sin_len != sizeof(*sin)) 421 return (EINVAL); 422 } else { 423 lsin = *((const struct sockaddr_in *) 424 inp->inp_socket->so_proto->pr_domain->dom_sa_any); 425 sin = &lsin; 426 } 427 428 /* Bind address. */ 429 error = in_pcbbind_addr(inp, sin, l->l_cred); 430 if (error) 431 return (error); 432 433 /* Bind port. */ 434 error = in_pcbbind_port(inp, sin, l->l_cred); 435 if (error) { 436 inp->inp_laddr.s_addr = INADDR_ANY; 437 438 return (error); 439 } 440 441 return (0); 442 } 443 444 /* 445 * Connect from a socket to a specified address. 446 * Both address and port must be specified in argument sin. 447 * If don't have a local address for this socket yet, 448 * then pick one. 449 */ 450 int 451 in_pcbconnect(void *v, struct sockaddr_in *sin, struct lwp *l) 452 { 453 struct inpcb *inp = v; 454 struct in_ifaddr *ia = NULL; 455 struct sockaddr_in *ifaddr = NULL; 456 vestigial_inpcb_t vestige; 457 int error; 458 459 if (inp->inp_af != AF_INET) 460 return (EINVAL); 461 462 if (sin->sin_len != sizeof (*sin)) 463 return (EINVAL); 464 if (sin->sin_family != AF_INET) 465 return (EAFNOSUPPORT); 466 if (sin->sin_port == 0) 467 return (EADDRNOTAVAIL); 468 469 if (IN_MULTICAST(sin->sin_addr.s_addr) && 470 inp->inp_socket->so_type == SOCK_STREAM) 471 return EADDRNOTAVAIL; 472 473 if (TAILQ_FIRST(&in_ifaddrhead) != 0) { 474 /* 475 * If the destination address is INADDR_ANY, 476 * use any local address (likely loopback). 477 * If the supplied address is INADDR_BROADCAST, 478 * use the broadcast address of an interface 479 * which supports broadcast. (loopback does not) 480 */ 481 482 if (in_nullhost(sin->sin_addr)) { 483 sin->sin_addr = 484 TAILQ_FIRST(&in_ifaddrhead)->ia_addr.sin_addr; 485 } else if (sin->sin_addr.s_addr == INADDR_BROADCAST) { 486 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) { 487 if (ia->ia_ifp->if_flags & IFF_BROADCAST) { 488 sin->sin_addr = 489 ia->ia_broadaddr.sin_addr; 490 break; 491 } 492 } 493 } 494 } 495 /* 496 * If we haven't bound which network number to use as ours, 497 * we will use the number of the outgoing interface. 498 * This depends on having done a routing lookup, which 499 * we will probably have to do anyway, so we might 500 * as well do it now. On the other hand if we are 501 * sending to multiple destinations we may have already 502 * done the lookup, so see if we can use the route 503 * from before. In any case, we only 504 * chose a port number once, even if sending to multiple 505 * destinations. 506 */ 507 if (in_nullhost(inp->inp_laddr)) { 508 int xerror; 509 ifaddr = in_selectsrc(sin, &inp->inp_route, 510 inp->inp_socket->so_options, inp->inp_moptions, &xerror); 511 if (ifaddr == NULL) { 512 if (xerror == 0) 513 xerror = EADDRNOTAVAIL; 514 return xerror; 515 } 516 INADDR_TO_IA(ifaddr->sin_addr, ia); 517 if (ia == NULL) 518 return (EADDRNOTAVAIL); 519 } 520 if (in_pcblookup_connect(inp->inp_table, sin->sin_addr, sin->sin_port, 521 !in_nullhost(inp->inp_laddr) ? inp->inp_laddr : ifaddr->sin_addr, 522 inp->inp_lport, &vestige) != 0 523 || vestige.valid) 524 return (EADDRINUSE); 525 if (in_nullhost(inp->inp_laddr)) { 526 if (inp->inp_lport == 0) { 527 error = in_pcbbind(inp, NULL, l); 528 /* 529 * This used to ignore the return value 530 * completely, but we need to check for 531 * ephemeral port shortage. 532 * And attempts to request low ports if not root. 533 */ 534 if (error != 0) 535 return (error); 536 } 537 inp->inp_laddr = ifaddr->sin_addr; 538 } 539 inp->inp_faddr = sin->sin_addr; 540 inp->inp_fport = sin->sin_port; 541 542 /* Late bind, if needed */ 543 if (inp->inp_bindportonsend) { 544 struct sockaddr_in lsin = *((const struct sockaddr_in *) 545 inp->inp_socket->so_proto->pr_domain->dom_sa_any); 546 lsin.sin_addr = inp->inp_laddr; 547 lsin.sin_port = 0; 548 549 if ((error = in_pcbbind_port(inp, &lsin, l->l_cred)) != 0) 550 return error; 551 } 552 553 in_pcbstate(inp, INP_CONNECTED); 554 #if defined(IPSEC) 555 if (ipsec_enabled && inp->inp_socket->so_type == SOCK_STREAM) 556 ipsec_pcbconn(inp->inp_sp); 557 #endif 558 return (0); 559 } 560 561 void 562 in_pcbdisconnect(void *v) 563 { 564 struct inpcb *inp = v; 565 566 if (inp->inp_af != AF_INET) 567 return; 568 569 inp->inp_faddr = zeroin_addr; 570 inp->inp_fport = 0; 571 in_pcbstate(inp, INP_BOUND); 572 #if defined(IPSEC) 573 if (ipsec_enabled) 574 ipsec_pcbdisconn(inp->inp_sp); 575 #endif 576 if (inp->inp_socket->so_state & SS_NOFDREF) 577 in_pcbdetach(inp); 578 } 579 580 void 581 in_pcbdetach(void *v) 582 { 583 struct inpcb *inp = v; 584 struct socket *so = inp->inp_socket; 585 int s; 586 587 if (inp->inp_af != AF_INET) 588 return; 589 590 #if defined(IPSEC) 591 if (ipsec_enabled) 592 ipsec4_delete_pcbpolicy(inp); 593 #endif 594 so->so_pcb = NULL; 595 596 s = splnet(); 597 in_pcbstate(inp, INP_ATTACHED); 598 LIST_REMOVE(&inp->inp_head, inph_lhash); 599 TAILQ_REMOVE(&inp->inp_table->inpt_queue, &inp->inp_head, inph_queue); 600 splx(s); 601 602 if (inp->inp_options) { 603 m_free(inp->inp_options); 604 } 605 rtcache_free(&inp->inp_route); 606 ip_freemoptions(inp->inp_moptions); 607 sofree(so); /* drops the socket's lock */ 608 609 pool_put(&inpcb_pool, inp); 610 mutex_enter(softnet_lock); /* reacquire the softnet_lock */ 611 } 612 613 void 614 in_setsockaddr(struct inpcb *inp, struct sockaddr_in *sin) 615 { 616 617 if (inp->inp_af != AF_INET) 618 return; 619 620 sockaddr_in_init(sin, &inp->inp_laddr, inp->inp_lport); 621 } 622 623 void 624 in_setpeeraddr(struct inpcb *inp, struct sockaddr_in *sin) 625 { 626 627 if (inp->inp_af != AF_INET) 628 return; 629 630 sockaddr_in_init(sin, &inp->inp_faddr, inp->inp_fport); 631 } 632 633 /* 634 * Pass some notification to all connections of a protocol 635 * associated with address dst. The local address and/or port numbers 636 * may be specified to limit the search. The "usual action" will be 637 * taken, depending on the ctlinput cmd. The caller must filter any 638 * cmds that are uninteresting (e.g., no error in the map). 639 * Call the protocol specific routine (if any) to report 640 * any errors for each matching socket. 641 * 642 * Must be called at splsoftnet. 643 */ 644 int 645 in_pcbnotify(struct inpcbtable *table, struct in_addr faddr, u_int fport_arg, 646 struct in_addr laddr, u_int lport_arg, int errno, 647 void (*notify)(struct inpcb *, int)) 648 { 649 struct inpcbhead *head; 650 struct inpcb *inp, *ninp; 651 u_int16_t fport = fport_arg, lport = lport_arg; 652 int nmatch; 653 654 if (in_nullhost(faddr) || notify == 0) 655 return (0); 656 657 nmatch = 0; 658 head = INPCBHASH_CONNECT(table, faddr, fport, laddr, lport); 659 for (inp = (struct inpcb *)LIST_FIRST(head); inp != NULL; inp = ninp) { 660 ninp = (struct inpcb *)LIST_NEXT(inp, inp_hash); 661 if (inp->inp_af != AF_INET) 662 continue; 663 if (in_hosteq(inp->inp_faddr, faddr) && 664 inp->inp_fport == fport && 665 inp->inp_lport == lport && 666 in_hosteq(inp->inp_laddr, laddr)) { 667 (*notify)(inp, errno); 668 nmatch++; 669 } 670 } 671 return (nmatch); 672 } 673 674 void 675 in_pcbnotifyall(struct inpcbtable *table, struct in_addr faddr, int errno, 676 void (*notify)(struct inpcb *, int)) 677 { 678 struct inpcb_hdr *inph, *ninph; 679 680 if (in_nullhost(faddr) || notify == 0) 681 return; 682 683 TAILQ_FOREACH_SAFE(inph, &table->inpt_queue, inph_queue, ninph) { 684 struct inpcb *inp = (struct inpcb *)inph; 685 if (inp->inp_af != AF_INET) 686 continue; 687 if (in_hosteq(inp->inp_faddr, faddr)) 688 (*notify)(inp, errno); 689 } 690 } 691 692 void 693 in_purgeifmcast(struct ip_moptions *imo, struct ifnet *ifp) 694 { 695 int i, gap; 696 697 if (imo == NULL) 698 return; 699 700 /* 701 * Unselect the outgoing interface if it is being 702 * detached. 703 */ 704 if (imo->imo_multicast_ifp == ifp) 705 imo->imo_multicast_ifp = NULL; 706 707 /* 708 * Drop multicast group membership if we joined 709 * through the interface being detached. 710 */ 711 for (i = 0, gap = 0; i < imo->imo_num_memberships; i++) { 712 if (imo->imo_membership[i]->inm_ifp == ifp) { 713 in_delmulti(imo->imo_membership[i]); 714 gap++; 715 } else if (gap != 0) 716 imo->imo_membership[i - gap] = imo->imo_membership[i]; 717 } 718 imo->imo_num_memberships -= gap; 719 } 720 721 void 722 in_pcbpurgeif0(struct inpcbtable *table, struct ifnet *ifp) 723 { 724 struct inpcb_hdr *inph, *ninph; 725 726 TAILQ_FOREACH_SAFE(inph, &table->inpt_queue, inph_queue, ninph) { 727 struct inpcb *inp = (struct inpcb *)inph; 728 if (inp->inp_af != AF_INET) 729 continue; 730 in_purgeifmcast(inp->inp_moptions, ifp); 731 } 732 } 733 734 void 735 in_pcbpurgeif(struct inpcbtable *table, struct ifnet *ifp) 736 { 737 struct rtentry *rt; 738 struct inpcb_hdr *inph, *ninph; 739 740 TAILQ_FOREACH_SAFE(inph, &table->inpt_queue, inph_queue, ninph) { 741 struct inpcb *inp = (struct inpcb *)inph; 742 if (inp->inp_af != AF_INET) 743 continue; 744 if ((rt = rtcache_validate(&inp->inp_route)) != NULL && 745 rt->rt_ifp == ifp) 746 in_rtchange(inp, 0); 747 } 748 } 749 750 /* 751 * Check for alternatives when higher level complains 752 * about service problems. For now, invalidate cached 753 * routing information. If the route was created dynamically 754 * (by a redirect), time to try a default gateway again. 755 */ 756 void 757 in_losing(struct inpcb *inp) 758 { 759 struct rtentry *rt; 760 struct rt_addrinfo info; 761 762 if (inp->inp_af != AF_INET) 763 return; 764 765 if ((rt = rtcache_validate(&inp->inp_route)) == NULL) 766 return; 767 768 memset(&info, 0, sizeof(info)); 769 info.rti_info[RTAX_DST] = rtcache_getdst(&inp->inp_route); 770 info.rti_info[RTAX_GATEWAY] = rt->rt_gateway; 771 info.rti_info[RTAX_NETMASK] = rt_mask(rt); 772 rt_missmsg(RTM_LOSING, &info, rt->rt_flags, 0); 773 if (rt->rt_flags & RTF_DYNAMIC) 774 (void) rtrequest(RTM_DELETE, rt_getkey(rt), 775 rt->rt_gateway, rt_mask(rt), rt->rt_flags, 776 NULL); 777 /* 778 * A new route can be allocated 779 * the next time output is attempted. 780 */ 781 rtcache_free(&inp->inp_route); 782 } 783 784 /* 785 * After a routing change, flush old routing. A new route can be 786 * allocated the next time output is attempted. 787 */ 788 void 789 in_rtchange(struct inpcb *inp, int errno) 790 { 791 792 if (inp->inp_af != AF_INET) 793 return; 794 795 rtcache_free(&inp->inp_route); 796 797 /* XXX SHOULD NOTIFY HIGHER-LEVEL PROTOCOLS */ 798 } 799 800 struct inpcb * 801 in_pcblookup_port(struct inpcbtable *table, struct in_addr laddr, 802 u_int lport_arg, int lookup_wildcard, vestigial_inpcb_t *vp) 803 { 804 struct inpcbhead *head; 805 struct inpcb_hdr *inph; 806 struct inpcb *match = NULL; 807 int matchwild = 3; 808 int wildcard; 809 u_int16_t lport = lport_arg; 810 811 if (vp) 812 vp->valid = 0; 813 814 head = INPCBHASH_PORT(table, lport); 815 LIST_FOREACH(inph, head, inph_lhash) { 816 struct inpcb * const inp = (struct inpcb *)inph; 817 818 if (inp->inp_af != AF_INET) 819 continue; 820 if (inp->inp_lport != lport) 821 continue; 822 /* 823 * check if inp's faddr and laddr match with ours. 824 * our faddr is considered null. 825 * count the number of wildcard matches. (0 - 2) 826 * 827 * null null match 828 * A null wildcard match 829 * null B wildcard match 830 * A B non match 831 * A A match 832 */ 833 wildcard = 0; 834 if (!in_nullhost(inp->inp_faddr)) 835 wildcard++; 836 if (in_nullhost(inp->inp_laddr)) { 837 if (!in_nullhost(laddr)) 838 wildcard++; 839 } else { 840 if (in_nullhost(laddr)) 841 wildcard++; 842 else { 843 if (!in_hosteq(inp->inp_laddr, laddr)) 844 continue; 845 } 846 } 847 if (wildcard && !lookup_wildcard) 848 continue; 849 /* 850 * prefer an address with less wildcards. 851 */ 852 if (wildcard < matchwild) { 853 match = inp; 854 matchwild = wildcard; 855 if (matchwild == 0) 856 break; 857 } 858 } 859 if (match && matchwild == 0) 860 return match; 861 862 if (vp && table->vestige) { 863 void *state = (*table->vestige->init_ports4)(laddr, lport_arg, lookup_wildcard); 864 vestigial_inpcb_t better; 865 866 while (table->vestige 867 && (*table->vestige->next_port4)(state, vp)) { 868 869 if (vp->lport != lport) 870 continue; 871 wildcard = 0; 872 if (!in_nullhost(vp->faddr.v4)) 873 wildcard++; 874 if (in_nullhost(vp->laddr.v4)) { 875 if (!in_nullhost(laddr)) 876 wildcard++; 877 } else { 878 if (in_nullhost(laddr)) 879 wildcard++; 880 else { 881 if (!in_hosteq(vp->laddr.v4, laddr)) 882 continue; 883 } 884 } 885 if (wildcard && !lookup_wildcard) 886 continue; 887 if (wildcard < matchwild) { 888 better = *vp; 889 match = (void*)&better; 890 891 matchwild = wildcard; 892 if (matchwild == 0) 893 break; 894 } 895 } 896 897 if (match) { 898 if (match != (void*)&better) 899 return match; 900 else { 901 *vp = better; 902 return 0; 903 } 904 } 905 } 906 907 return (match); 908 } 909 910 #ifdef DIAGNOSTIC 911 int in_pcbnotifymiss = 0; 912 #endif 913 914 struct inpcb * 915 in_pcblookup_connect(struct inpcbtable *table, 916 struct in_addr faddr, u_int fport_arg, 917 struct in_addr laddr, u_int lport_arg, 918 vestigial_inpcb_t *vp) 919 { 920 struct inpcbhead *head; 921 struct inpcb_hdr *inph; 922 struct inpcb *inp; 923 u_int16_t fport = fport_arg, lport = lport_arg; 924 925 if (vp) 926 vp->valid = 0; 927 928 head = INPCBHASH_CONNECT(table, faddr, fport, laddr, lport); 929 LIST_FOREACH(inph, head, inph_hash) { 930 inp = (struct inpcb *)inph; 931 if (inp->inp_af != AF_INET) 932 continue; 933 934 if (in_hosteq(inp->inp_faddr, faddr) && 935 inp->inp_fport == fport && 936 inp->inp_lport == lport && 937 in_hosteq(inp->inp_laddr, laddr)) 938 goto out; 939 } 940 if (vp && table->vestige) { 941 if ((*table->vestige->lookup4)(faddr, fport_arg, 942 laddr, lport_arg, vp)) 943 return 0; 944 } 945 946 #ifdef DIAGNOSTIC 947 if (in_pcbnotifymiss) { 948 printf("in_pcblookup_connect: faddr=%08x fport=%d laddr=%08x lport=%d\n", 949 ntohl(faddr.s_addr), ntohs(fport), 950 ntohl(laddr.s_addr), ntohs(lport)); 951 } 952 #endif 953 return (0); 954 955 out: 956 /* Move this PCB to the head of hash chain. */ 957 inph = &inp->inp_head; 958 if (inph != LIST_FIRST(head)) { 959 LIST_REMOVE(inph, inph_hash); 960 LIST_INSERT_HEAD(head, inph, inph_hash); 961 } 962 return (inp); 963 } 964 965 struct inpcb * 966 in_pcblookup_bind(struct inpcbtable *table, 967 struct in_addr laddr, u_int lport_arg) 968 { 969 struct inpcbhead *head; 970 struct inpcb_hdr *inph; 971 struct inpcb *inp; 972 u_int16_t lport = lport_arg; 973 974 head = INPCBHASH_BIND(table, laddr, lport); 975 LIST_FOREACH(inph, head, inph_hash) { 976 inp = (struct inpcb *)inph; 977 if (inp->inp_af != AF_INET) 978 continue; 979 980 if (inp->inp_lport == lport && 981 in_hosteq(inp->inp_laddr, laddr)) 982 goto out; 983 } 984 head = INPCBHASH_BIND(table, zeroin_addr, lport); 985 LIST_FOREACH(inph, head, inph_hash) { 986 inp = (struct inpcb *)inph; 987 if (inp->inp_af != AF_INET) 988 continue; 989 990 if (inp->inp_lport == lport && 991 in_hosteq(inp->inp_laddr, zeroin_addr)) 992 goto out; 993 } 994 #ifdef DIAGNOSTIC 995 if (in_pcbnotifymiss) { 996 printf("in_pcblookup_bind: laddr=%08x lport=%d\n", 997 ntohl(laddr.s_addr), ntohs(lport)); 998 } 999 #endif 1000 return (0); 1001 1002 out: 1003 /* Move this PCB to the head of hash chain. */ 1004 inph = &inp->inp_head; 1005 if (inph != LIST_FIRST(head)) { 1006 LIST_REMOVE(inph, inph_hash); 1007 LIST_INSERT_HEAD(head, inph, inph_hash); 1008 } 1009 return (inp); 1010 } 1011 1012 void 1013 in_pcbstate(struct inpcb *inp, int state) 1014 { 1015 1016 if (inp->inp_af != AF_INET) 1017 return; 1018 1019 if (inp->inp_state > INP_ATTACHED) 1020 LIST_REMOVE(&inp->inp_head, inph_hash); 1021 1022 switch (state) { 1023 case INP_BOUND: 1024 LIST_INSERT_HEAD(INPCBHASH_BIND(inp->inp_table, 1025 inp->inp_laddr, inp->inp_lport), &inp->inp_head, 1026 inph_hash); 1027 break; 1028 case INP_CONNECTED: 1029 LIST_INSERT_HEAD(INPCBHASH_CONNECT(inp->inp_table, 1030 inp->inp_faddr, inp->inp_fport, 1031 inp->inp_laddr, inp->inp_lport), &inp->inp_head, 1032 inph_hash); 1033 break; 1034 } 1035 1036 inp->inp_state = state; 1037 } 1038 1039 struct rtentry * 1040 in_pcbrtentry(struct inpcb *inp) 1041 { 1042 struct route *ro; 1043 union { 1044 struct sockaddr dst; 1045 struct sockaddr_in dst4; 1046 } u; 1047 1048 if (inp->inp_af != AF_INET) 1049 return (NULL); 1050 1051 ro = &inp->inp_route; 1052 1053 sockaddr_in_init(&u.dst4, &inp->inp_faddr, 0); 1054 return rtcache_lookup(ro, &u.dst); 1055 } 1056