xref: /netbsd-src/sys/netinet6/udp6_usrreq.c (revision 466a16a118933bd295a8a104f095714fadf9cf68)
1 /*	$NetBSD: udp6_usrreq.c,v 1.86 2008/05/04 07:22:15 thorpej Exp $	*/
2 /*	$KAME: udp6_usrreq.c,v 1.86 2001/05/27 17:33:00 itojun Exp $	*/
3 
4 /*
5  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the project nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 /*
34  * Copyright (c) 1982, 1986, 1989, 1993
35  *	The Regents of the University of California.  All rights reserved.
36  *
37  * Redistribution and use in source and binary forms, with or without
38  * modification, are permitted provided that the following conditions
39  * are met:
40  * 1. Redistributions of source code must retain the above copyright
41  *    notice, this list of conditions and the following disclaimer.
42  * 2. Redistributions in binary form must reproduce the above copyright
43  *    notice, this list of conditions and the following disclaimer in the
44  *    documentation and/or other materials provided with the distribution.
45  * 3. Neither the name of the University nor the names of its contributors
46  *    may be used to endorse or promote products derived from this software
47  *    without specific prior written permission.
48  *
49  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59  * SUCH DAMAGE.
60  *
61  *	@(#)udp_var.h	8.1 (Berkeley) 6/10/93
62  */
63 
64 #include <sys/cdefs.h>
65 __KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.86 2008/05/04 07:22:15 thorpej Exp $");
66 
67 #include <sys/param.h>
68 #include <sys/malloc.h>
69 #include <sys/mbuf.h>
70 #include <sys/protosw.h>
71 #include <sys/socket.h>
72 #include <sys/socketvar.h>
73 #include <sys/errno.h>
74 #include <sys/stat.h>
75 #include <sys/systm.h>
76 #include <sys/proc.h>
77 #include <sys/syslog.h>
78 #include <sys/sysctl.h>
79 
80 #include <net/if.h>
81 #include <net/route.h>
82 #include <net/if_types.h>
83 
84 #include <netinet/in.h>
85 #include <netinet/in_var.h>
86 #include <netinet/in_systm.h>
87 #include <netinet/ip.h>
88 #include <netinet/ip_var.h>
89 #include <netinet/in_pcb.h>
90 #include <netinet/udp.h>
91 #include <netinet/udp_var.h>
92 #include <netinet/ip6.h>
93 #include <netinet6/ip6_var.h>
94 #include <netinet6/in6_pcb.h>
95 #include <netinet/icmp6.h>
96 #include <netinet6/udp6_var.h>
97 #include <netinet6/udp6_private.h>
98 #include <netinet6/ip6protosw.h>
99 #include <netinet/in_offload.h>
100 
101 #include "faith.h"
102 #if defined(NFAITH) && NFAITH > 0
103 #include <net/if_faith.h>
104 #endif
105 
106 /*
107  * UDP protocol implementation.
108  * Per RFC 768, August, 1980.
109  */
110 
111 extern struct inpcbtable udbtable;
112 
113 percpu_t *udp6stat_percpu;
114 
115 static	void udp6_notify(struct in6pcb *, int);
116 
117 void
118 udp6_init(void)
119 {
120 	/* initialization done in udp_init() due to initialization order */
121 }
122 
123 /*
124  * Notify a udp user of an asynchronous error;
125  * just wake up so that he can collect error status.
126  */
127 static	void
128 udp6_notify(struct in6pcb *in6p, int errno)
129 {
130 	in6p->in6p_socket->so_error = errno;
131 	sorwakeup(in6p->in6p_socket);
132 	sowwakeup(in6p->in6p_socket);
133 }
134 
135 void *
136 udp6_ctlinput(int cmd, const struct sockaddr *sa, void *d)
137 {
138 	struct udphdr uh;
139 	struct ip6_hdr *ip6;
140 	const struct sockaddr_in6 *sa6 = (const struct sockaddr_in6 *)sa;
141 	struct mbuf *m;
142 	int off;
143 	void *cmdarg;
144 	struct ip6ctlparam *ip6cp = NULL;
145 	const struct sockaddr_in6 *sa6_src = NULL;
146 	void (*notify)(struct in6pcb *, int) = udp6_notify;
147 	struct udp_portonly {
148 		u_int16_t uh_sport;
149 		u_int16_t uh_dport;
150 	} *uhp;
151 
152 	if (sa->sa_family != AF_INET6 ||
153 	    sa->sa_len != sizeof(struct sockaddr_in6))
154 		return NULL;
155 
156 	if ((unsigned)cmd >= PRC_NCMDS)
157 		return NULL;
158 	if (PRC_IS_REDIRECT(cmd))
159 		notify = in6_rtchange, d = NULL;
160 	else if (cmd == PRC_HOSTDEAD)
161 		d = NULL;
162 	else if (cmd == PRC_MSGSIZE) {
163 		/* special code is present, see below */
164 		notify = in6_rtchange;
165 	}
166 	else if (inet6ctlerrmap[cmd] == 0)
167 		return NULL;
168 
169 	/* if the parameter is from icmp6, decode it. */
170 	if (d != NULL) {
171 		ip6cp = (struct ip6ctlparam *)d;
172 		m = ip6cp->ip6c_m;
173 		ip6 = ip6cp->ip6c_ip6;
174 		off = ip6cp->ip6c_off;
175 		cmdarg = ip6cp->ip6c_cmdarg;
176 		sa6_src = ip6cp->ip6c_src;
177 	} else {
178 		m = NULL;
179 		ip6 = NULL;
180 		cmdarg = NULL;
181 		sa6_src = &sa6_any;
182 		off = 0;
183 	}
184 
185 	if (ip6) {
186 		/*
187 		 * XXX: We assume that when IPV6 is non NULL,
188 		 * M and OFF are valid.
189 		 */
190 
191 		/* check if we can safely examine src and dst ports */
192 		if (m->m_pkthdr.len < off + sizeof(*uhp)) {
193 			if (cmd == PRC_MSGSIZE)
194 				icmp6_mtudisc_update((struct ip6ctlparam *)d, 0);
195 			return NULL;
196 		}
197 
198 		bzero(&uh, sizeof(uh));
199 		m_copydata(m, off, sizeof(*uhp), (void *)&uh);
200 
201 		if (cmd == PRC_MSGSIZE) {
202 			int valid = 0;
203 
204 			/*
205 			 * Check to see if we have a valid UDP socket
206 			 * corresponding to the address in the ICMPv6 message
207 			 * payload.
208 			 */
209 			if (in6_pcblookup_connect(&udbtable, &sa6->sin6_addr,
210 			    uh.uh_dport, (const struct in6_addr *)&sa6_src->sin6_addr,
211 			    uh.uh_sport, 0))
212 				valid++;
213 #if 0
214 			/*
215 			 * As the use of sendto(2) is fairly popular,
216 			 * we may want to allow non-connected pcb too.
217 			 * But it could be too weak against attacks...
218 			 * We should at least check if the local address (= s)
219 			 * is really ours.
220 			 */
221 			else if (in6_pcblookup_bind(&udbtable, &sa6->sin6_addr,
222 			    uh.uh_dport, 0))
223 				valid++;
224 #endif
225 
226 			/*
227 			 * Depending on the value of "valid" and routing table
228 			 * size (mtudisc_{hi,lo}wat), we will:
229 			 * - recalculate the new MTU and create the
230 			 *   corresponding routing entry, or
231 			 * - ignore the MTU change notification.
232 			 */
233 			icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
234 
235 			/*
236 			 * regardless of if we called
237 			 * icmp6_mtudisc_update(), we need to call
238 			 * in6_pcbnotify(), to notify path MTU change
239 			 * to the userland (RFC3542), because some
240 			 * unconnected sockets may share the same
241 			 * destination and want to know the path MTU.
242 			 */
243 		}
244 
245 		(void) in6_pcbnotify(&udbtable, sa, uh.uh_dport,
246 		    (const struct sockaddr *)sa6_src, uh.uh_sport, cmd, cmdarg,
247 		    notify);
248 	} else {
249 		(void) in6_pcbnotify(&udbtable, sa, 0,
250 		    (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
251 	}
252 	return NULL;
253 }
254 
255 extern	int udp6_sendspace;
256 extern	int udp6_recvspace;
257 
258 int
259 udp6_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *addr6,
260     struct mbuf *control, struct lwp *l)
261 {
262 	struct	in6pcb *in6p = sotoin6pcb(so);
263 	int	error = 0;
264 	int	s;
265 
266 	/*
267 	 * MAPPED_ADDR implementation info:
268 	 *  Mapped addr support for PRU_CONTROL is not necessary.
269 	 *  Because typical user of PRU_CONTROL is such as ifconfig,
270 	 *  and they don't associate any addr to their socket.  Then
271 	 *  socket family is only hint about the PRU_CONTROL'ed address
272 	 *  family, especially when getting addrs from kernel.
273 	 *  So AF_INET socket need to be used to control AF_INET addrs,
274 	 *  and AF_INET6 socket for AF_INET6 addrs.
275 	 */
276 	if (req == PRU_CONTROL)
277 		return in6_control(so, (u_long)m, (void *)addr6,
278 				   (struct ifnet *)control, l);
279 
280 	if (req == PRU_PURGEIF) {
281 		mutex_enter(softnet_lock);
282 		in6_pcbpurgeif0(&udbtable, (struct ifnet *)control);
283 		in6_purgeif((struct ifnet *)control);
284 		in6_pcbpurgeif(&udbtable, (struct ifnet *)control);
285 		mutex_exit(softnet_lock);
286 		return 0;
287 	}
288 
289 	if (req == PRU_ATTACH)
290 		sosetlock(so);
291 	else if (in6p == NULL) {
292 		error = EINVAL;
293 		goto release;
294 	}
295 
296 	switch (req) {
297 	case PRU_ATTACH:
298 		/*
299 		 * MAPPED_ADDR implementation spec:
300 		 *  Always attach for IPv6,
301 		 *  and only when necessary for IPv4.
302 		 */
303 		if (in6p != NULL) {
304 			error = EINVAL;
305 			break;
306 		}
307 		s = splsoftnet();
308 		error = in6_pcballoc(so, &udbtable);
309 		splx(s);
310 		if (error)
311 			break;
312 		error = soreserve(so, udp6_sendspace, udp6_recvspace);
313 		if (error)
314 			break;
315 		in6p = sotoin6pcb(so);
316 		in6p->in6p_cksum = -1;	/* just to be sure */
317 		break;
318 
319 	case PRU_DETACH:
320 		in6_pcbdetach(in6p);
321 		break;
322 
323 	case PRU_BIND:
324 		s = splsoftnet();
325 		error = in6_pcbbind(in6p, addr6, l);
326 		splx(s);
327 		break;
328 
329 	case PRU_CONNECT:
330 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
331 			error = EISCONN;
332 			break;
333 		}
334 		s = splsoftnet();
335 		error = in6_pcbconnect(in6p, addr6, l);
336 		splx(s);
337 		if (error == 0)
338 			soisconnected(so);
339 		break;
340 
341 	case PRU_DISCONNECT:
342 		if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
343 			error = ENOTCONN;
344 			break;
345 		}
346 		s = splsoftnet();
347 		in6_pcbdisconnect(in6p);
348 		bzero((void *)&in6p->in6p_laddr, sizeof(in6p->in6p_laddr));
349 		splx(s);
350 		so->so_state &= ~SS_ISCONNECTED;		/* XXX */
351 		in6_pcbstate(in6p, IN6P_BOUND);		/* XXX */
352 		break;
353 
354 	case PRU_SHUTDOWN:
355 		socantsendmore(so);
356 		break;
357 
358 	case PRU_SEND:
359 		s = splsoftnet();
360 		error = udp6_output(in6p, m, addr6, control, l);
361 		splx(s);
362 		return error;
363 
364 	case PRU_ABORT:
365 		soisdisconnected(so);
366 		in6_pcbdetach(in6p);
367 		break;
368 
369 	case PRU_SOCKADDR:
370 		in6_setsockaddr(in6p, addr6);
371 		break;
372 
373 	case PRU_PEERADDR:
374 		in6_setpeeraddr(in6p, addr6);
375 		break;
376 
377 	case PRU_SENSE:
378 		/*
379 		 * stat: don't bother with a blocksize
380 		 */
381 		return 0;
382 
383 	case PRU_LISTEN:
384 	case PRU_CONNECT2:
385 	case PRU_ACCEPT:
386 	case PRU_SENDOOB:
387 	case PRU_FASTTIMO:
388 	case PRU_SLOWTIMO:
389 	case PRU_PROTORCV:
390 	case PRU_PROTOSEND:
391 		error = EOPNOTSUPP;
392 		break;
393 
394 	case PRU_RCVD:
395 	case PRU_RCVOOB:
396 		return EOPNOTSUPP;	/* do not free mbuf's */
397 
398 	default:
399 		panic("udp6_usrreq");
400 	}
401 
402 release:
403 	if (control != NULL)
404 		m_freem(control);
405 	if (m != NULL)
406 		m_freem(m);
407 	return error;
408 }
409 
410 static int
411 sysctl_net_inet6_udp6_stats(SYSCTLFN_ARGS)
412 {
413 
414 	return (NETSTAT_SYSCTL(udp6stat_percpu, UDP6_NSTATS));
415 }
416 
417 SYSCTL_SETUP(sysctl_net_inet6_udp6_setup, "sysctl net.inet6.udp6 subtree setup")
418 {
419 	sysctl_createv(clog, 0, NULL, NULL,
420 		       CTLFLAG_PERMANENT,
421 		       CTLTYPE_NODE, "net", NULL,
422 		       NULL, 0, NULL, 0,
423 		       CTL_NET, CTL_EOL);
424 	sysctl_createv(clog, 0, NULL, NULL,
425 		       CTLFLAG_PERMANENT,
426 		       CTLTYPE_NODE, "inet6", NULL,
427 		       NULL, 0, NULL, 0,
428 		       CTL_NET, PF_INET6, CTL_EOL);
429 	sysctl_createv(clog, 0, NULL, NULL,
430 		       CTLFLAG_PERMANENT,
431 		       CTLTYPE_NODE, "udp6",
432 		       SYSCTL_DESCR("UDPv6 related settings"),
433 		       NULL, 0, NULL, 0,
434 		       CTL_NET, PF_INET6, IPPROTO_UDP, CTL_EOL);
435 
436 	sysctl_createv(clog, 0, NULL, NULL,
437 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
438 		       CTLTYPE_INT, "sendspace",
439 		       SYSCTL_DESCR("Default UDP send buffer size"),
440 		       NULL, 0, &udp6_sendspace, 0,
441 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_SENDSPACE,
442 		       CTL_EOL);
443 	sysctl_createv(clog, 0, NULL, NULL,
444 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
445 		       CTLTYPE_INT, "recvspace",
446 		       SYSCTL_DESCR("Default UDP receive buffer size"),
447 		       NULL, 0, &udp6_recvspace, 0,
448 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_RECVSPACE,
449 		       CTL_EOL);
450 	sysctl_createv(clog, 0, NULL, NULL,
451 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
452 		       CTLTYPE_INT, "do_loopback_cksum",
453 		       SYSCTL_DESCR("Perform UDP checksum on loopback"),
454 		       NULL, 0, &udp_do_loopback_cksum, 0,
455 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_LOOPBACKCKSUM,
456 		       CTL_EOL);
457 	sysctl_createv(clog, 0, NULL, NULL,
458 		       CTLFLAG_PERMANENT,
459 		       CTLTYPE_STRUCT, "pcblist",
460 		       SYSCTL_DESCR("UDP protocol control block list"),
461 		       sysctl_inpcblist, 0, &udbtable, 0,
462 		       CTL_NET, PF_INET6, IPPROTO_UDP, CTL_CREATE,
463 		       CTL_EOL);
464 	sysctl_createv(clog, 0, NULL, NULL,
465 		       CTLFLAG_PERMANENT,
466 		       CTLTYPE_STRUCT, "stats",
467 		       SYSCTL_DESCR("UDPv6 statistics"),
468 		       sysctl_net_inet6_udp6_stats, 0, NULL, 0,
469 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_STATS,
470 		       CTL_EOL);
471 }
472 
473 void
474 udp6_statinc(u_int stat)
475 {
476 
477 	KASSERT(stat < UDP6_NSTATS);
478 	UDP6_STATINC(stat);
479 }
480