xref: /netbsd-src/sys/netinet6/udp6_usrreq.c (revision d48f14661dda8638fee055ba15d35bdfb29b9fa8)
1 /*	$NetBSD: udp6_usrreq.c,v 1.74 2006/05/05 00:03:22 rpaulo Exp $	*/
2 /*	$KAME: udp6_usrreq.c,v 1.86 2001/05/27 17:33:00 itojun Exp $	*/
3 
4 /*
5  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the project nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 /*
34  * Copyright (c) 1982, 1986, 1989, 1993
35  *	The Regents of the University of California.  All rights reserved.
36  *
37  * Redistribution and use in source and binary forms, with or without
38  * modification, are permitted provided that the following conditions
39  * are met:
40  * 1. Redistributions of source code must retain the above copyright
41  *    notice, this list of conditions and the following disclaimer.
42  * 2. Redistributions in binary form must reproduce the above copyright
43  *    notice, this list of conditions and the following disclaimer in the
44  *    documentation and/or other materials provided with the distribution.
45  * 3. Neither the name of the University nor the names of its contributors
46  *    may be used to endorse or promote products derived from this software
47  *    without specific prior written permission.
48  *
49  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59  * SUCH DAMAGE.
60  *
61  *	@(#)udp_var.h	8.1 (Berkeley) 6/10/93
62  */
63 
64 #include <sys/cdefs.h>
65 __KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.74 2006/05/05 00:03:22 rpaulo Exp $");
66 
67 #include <sys/param.h>
68 #include <sys/malloc.h>
69 #include <sys/mbuf.h>
70 #include <sys/protosw.h>
71 #include <sys/socket.h>
72 #include <sys/socketvar.h>
73 #include <sys/errno.h>
74 #include <sys/stat.h>
75 #include <sys/systm.h>
76 #include <sys/proc.h>
77 #include <sys/syslog.h>
78 #include <sys/sysctl.h>
79 
80 #include <net/if.h>
81 #include <net/route.h>
82 #include <net/if_types.h>
83 
84 #include <netinet/in.h>
85 #include <netinet/in_var.h>
86 #include <netinet/in_systm.h>
87 #include <netinet/ip.h>
88 #include <netinet/ip_var.h>
89 #include <netinet/in_pcb.h>
90 #include <netinet/udp.h>
91 #include <netinet/udp_var.h>
92 #include <netinet/ip6.h>
93 #include <netinet6/ip6_var.h>
94 #include <netinet6/in6_pcb.h>
95 #include <netinet/icmp6.h>
96 #include <netinet6/udp6_var.h>
97 #include <netinet6/ip6protosw.h>
98 #include <netinet/in_offload.h>
99 
100 #include "faith.h"
101 #if defined(NFAITH) && NFAITH > 0
102 #include <net/if_faith.h>
103 #endif
104 
105 /*
106  * UDP protocol implementation.
107  * Per RFC 768, August, 1980.
108  */
109 
110 extern struct inpcbtable udbtable;
111 struct	udp6stat udp6stat;
112 
113 static	void udp6_notify __P((struct in6pcb *, int));
114 
115 void
116 udp6_init()
117 {
118 	/* initialization done in udp_input() due to initialization order */
119 }
120 
121 /*
122  * Notify a udp user of an asynchronous error;
123  * just wake up so that he can collect error status.
124  */
125 static	void
126 udp6_notify(in6p, errno)
127 	struct in6pcb *in6p;
128 	int errno;
129 {
130 	in6p->in6p_socket->so_error = errno;
131 	sorwakeup(in6p->in6p_socket);
132 	sowwakeup(in6p->in6p_socket);
133 }
134 
135 void
136 udp6_ctlinput(cmd, sa, d)
137 	int cmd;
138 	struct sockaddr *sa;
139 	void *d;
140 {
141 	struct udphdr uh;
142 	struct ip6_hdr *ip6;
143 	struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
144 	struct mbuf *m;
145 	int off;
146 	void *cmdarg;
147 	struct ip6ctlparam *ip6cp = NULL;
148 	const struct sockaddr_in6 *sa6_src = NULL;
149 	void (*notify) __P((struct in6pcb *, int)) = udp6_notify;
150 	struct udp_portonly {
151 		u_int16_t uh_sport;
152 		u_int16_t uh_dport;
153 	} *uhp;
154 
155 	if (sa->sa_family != AF_INET6 ||
156 	    sa->sa_len != sizeof(struct sockaddr_in6))
157 		return;
158 
159 	if ((unsigned)cmd >= PRC_NCMDS)
160 		return;
161 	if (PRC_IS_REDIRECT(cmd))
162 		notify = in6_rtchange, d = NULL;
163 	else if (cmd == PRC_HOSTDEAD)
164 		d = NULL;
165 	else if (cmd == PRC_MSGSIZE) {
166 		/* special code is present, see below */
167 		notify = in6_rtchange;
168 	}
169 	else if (inet6ctlerrmap[cmd] == 0)
170 		return;
171 
172 	/* if the parameter is from icmp6, decode it. */
173 	if (d != NULL) {
174 		ip6cp = (struct ip6ctlparam *)d;
175 		m = ip6cp->ip6c_m;
176 		ip6 = ip6cp->ip6c_ip6;
177 		off = ip6cp->ip6c_off;
178 		cmdarg = ip6cp->ip6c_cmdarg;
179 		sa6_src = ip6cp->ip6c_src;
180 	} else {
181 		m = NULL;
182 		ip6 = NULL;
183 		cmdarg = NULL;
184 		sa6_src = &sa6_any;
185 		off = 0;
186 	}
187 
188 	if (ip6) {
189 		/*
190 		 * XXX: We assume that when IPV6 is non NULL,
191 		 * M and OFF are valid.
192 		 */
193 
194 		/* check if we can safely examine src and dst ports */
195 		if (m->m_pkthdr.len < off + sizeof(*uhp)) {
196 			if (cmd == PRC_MSGSIZE)
197 				icmp6_mtudisc_update((struct ip6ctlparam *)d, 0);
198 			return;
199 		}
200 
201 		bzero(&uh, sizeof(uh));
202 		m_copydata(m, off, sizeof(*uhp), (caddr_t)&uh);
203 
204 		if (cmd == PRC_MSGSIZE) {
205 			int valid = 0;
206 
207 			/*
208 			 * Check to see if we have a valid UDP socket
209 			 * corresponding to the address in the ICMPv6 message
210 			 * payload.
211 			 */
212 			if (in6_pcblookup_connect(&udbtable, &sa6->sin6_addr,
213 			    uh.uh_dport, (const struct in6_addr *)&sa6_src->sin6_addr,
214 			    uh.uh_sport, 0))
215 				valid++;
216 #if 0
217 			/*
218 			 * As the use of sendto(2) is fairly popular,
219 			 * we may want to allow non-connected pcb too.
220 			 * But it could be too weak against attacks...
221 			 * We should at least check if the local address (= s)
222 			 * is really ours.
223 			 */
224 			else if (in6_pcblookup_bind(&udbtable, &sa6->sin6_addr,
225 			    uh.uh_dport, 0))
226 				valid++;
227 #endif
228 
229 			/*
230 			 * Depending on the value of "valid" and routing table
231 			 * size (mtudisc_{hi,lo}wat), we will:
232 			 * - recalculate the new MTU and create the
233 			 *   corresponding routing entry, or
234 			 * - ignore the MTU change notification.
235 			 */
236 			icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
237 
238 			/*
239 			 * regardless of if we called
240 			 * icmp6_mtudisc_update(), we need to call
241 			 * in6_pcbnotify(), to notify path MTU change
242 			 * to the userland (RFC3542), because some
243 			 * unconnected sockets may share the same
244 			 * destination and want to know the path MTU.
245 			 */
246 		}
247 
248 		(void) in6_pcbnotify(&udbtable, sa, uh.uh_dport,
249 		    (const struct sockaddr *)sa6_src, uh.uh_sport, cmd, cmdarg,
250 		    notify);
251 	} else {
252 		(void) in6_pcbnotify(&udbtable, sa, 0,
253 		    (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
254 	}
255 }
256 
257 extern	int udp6_sendspace;
258 extern	int udp6_recvspace;
259 
260 int
261 udp6_usrreq(so, req, m, addr6, control, l)
262 	struct socket *so;
263 	int req;
264 	struct mbuf *m, *addr6, *control;
265 	struct lwp *l;
266 {
267 	struct	in6pcb *in6p = sotoin6pcb(so);
268 	struct	proc *p;
269 	int	error = 0;
270 	int	s;
271 
272 	p = l ? l->l_proc : NULL;
273 	/*
274 	 * MAPPED_ADDR implementation info:
275 	 *  Mapped addr support for PRU_CONTROL is not necessary.
276 	 *  Because typical user of PRU_CONTROL is such as ifconfig,
277 	 *  and they don't associate any addr to their socket.  Then
278 	 *  socket family is only hint about the PRU_CONTROL'ed address
279 	 *  family, especially when getting addrs from kernel.
280 	 *  So AF_INET socket need to be used to control AF_INET addrs,
281 	 *  and AF_INET6 socket for AF_INET6 addrs.
282 	 */
283 	if (req == PRU_CONTROL)
284 		return (in6_control(so, (u_long)m, (caddr_t)addr6,
285 				   (struct ifnet *)control, p));
286 
287 	if (req == PRU_PURGEIF) {
288 		in6_pcbpurgeif0(&udbtable, (struct ifnet *)control);
289 		in6_purgeif((struct ifnet *)control);
290 		in6_pcbpurgeif(&udbtable, (struct ifnet *)control);
291 		return (0);
292 	}
293 
294 	if (in6p == NULL && req != PRU_ATTACH) {
295 		error = EINVAL;
296 		goto release;
297 	}
298 
299 	switch (req) {
300 	case PRU_ATTACH:
301 		/*
302 		 * MAPPED_ADDR implementation spec:
303 		 *  Always attach for IPv6,
304 		 *  and only when necessary for IPv4.
305 		 */
306 		if (in6p != NULL) {
307 			error = EINVAL;
308 			break;
309 		}
310 		s = splsoftnet();
311 		error = in6_pcballoc(so, &udbtable);
312 		splx(s);
313 		if (error)
314 			break;
315 		error = soreserve(so, udp6_sendspace, udp6_recvspace);
316 		if (error)
317 			break;
318 		in6p = sotoin6pcb(so);
319 		in6p->in6p_cksum = -1;	/* just to be sure */
320 		break;
321 
322 	case PRU_DETACH:
323 		in6_pcbdetach(in6p);
324 		break;
325 
326 	case PRU_BIND:
327 		s = splsoftnet();
328 		error = in6_pcbbind(in6p, addr6, p);
329 		splx(s);
330 		break;
331 
332 	case PRU_LISTEN:
333 		error = EOPNOTSUPP;
334 		break;
335 
336 	case PRU_CONNECT:
337 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
338 			error = EISCONN;
339 			break;
340 		}
341 		s = splsoftnet();
342 		error = in6_pcbconnect(in6p, addr6, p);
343 		splx(s);
344 		if (error == 0)
345 			soisconnected(so);
346 		break;
347 
348 	case PRU_CONNECT2:
349 		error = EOPNOTSUPP;
350 		break;
351 
352 	case PRU_ACCEPT:
353 		error = EOPNOTSUPP;
354 		break;
355 
356 	case PRU_DISCONNECT:
357 		if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
358 			error = ENOTCONN;
359 			break;
360 		}
361 		s = splsoftnet();
362 		in6_pcbdisconnect(in6p);
363 		bzero((caddr_t)&in6p->in6p_laddr, sizeof(in6p->in6p_laddr));
364 		splx(s);
365 		so->so_state &= ~SS_ISCONNECTED;		/* XXX */
366 		in6_pcbstate(in6p, IN6P_BOUND);		/* XXX */
367 		break;
368 
369 	case PRU_SHUTDOWN:
370 		socantsendmore(so);
371 		break;
372 
373 	case PRU_SEND:
374 		return (udp6_output(in6p, m, addr6, control, p));
375 
376 	case PRU_ABORT:
377 		soisdisconnected(so);
378 		in6_pcbdetach(in6p);
379 		break;
380 
381 	case PRU_SOCKADDR:
382 		in6_setsockaddr(in6p, addr6);
383 		break;
384 
385 	case PRU_PEERADDR:
386 		in6_setpeeraddr(in6p, addr6);
387 		break;
388 
389 	case PRU_SENSE:
390 		/*
391 		 * stat: don't bother with a blocksize
392 		 */
393 		return (0);
394 
395 	case PRU_SENDOOB:
396 	case PRU_FASTTIMO:
397 	case PRU_SLOWTIMO:
398 	case PRU_PROTORCV:
399 	case PRU_PROTOSEND:
400 		error = EOPNOTSUPP;
401 		break;
402 
403 	case PRU_RCVD:
404 	case PRU_RCVOOB:
405 		return (EOPNOTSUPP);	/* do not free mbuf's */
406 
407 	default:
408 		panic("udp6_usrreq");
409 	}
410 
411 release:
412 	if (control)
413 		m_freem(control);
414 	if (m)
415 		m_freem(m);
416 	return (error);
417 }
418 
419 SYSCTL_SETUP(sysctl_net_inet6_udp6_setup, "sysctl net.inet6.udp6 subtree setup")
420 {
421 	sysctl_createv(clog, 0, NULL, NULL,
422 		       CTLFLAG_PERMANENT,
423 		       CTLTYPE_NODE, "net", NULL,
424 		       NULL, 0, NULL, 0,
425 		       CTL_NET, CTL_EOL);
426 	sysctl_createv(clog, 0, NULL, NULL,
427 		       CTLFLAG_PERMANENT,
428 		       CTLTYPE_NODE, "inet6", NULL,
429 		       NULL, 0, NULL, 0,
430 		       CTL_NET, PF_INET6, CTL_EOL);
431 	sysctl_createv(clog, 0, NULL, NULL,
432 		       CTLFLAG_PERMANENT,
433 		       CTLTYPE_NODE, "udp6",
434 		       SYSCTL_DESCR("UDPv6 related settings"),
435 		       NULL, 0, NULL, 0,
436 		       CTL_NET, PF_INET6, IPPROTO_UDP, CTL_EOL);
437 
438 	sysctl_createv(clog, 0, NULL, NULL,
439 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
440 		       CTLTYPE_INT, "sendspace",
441 		       SYSCTL_DESCR("Default UDP send buffer size"),
442 		       NULL, 0, &udp6_sendspace, 0,
443 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_SENDSPACE,
444 		       CTL_EOL);
445 	sysctl_createv(clog, 0, NULL, NULL,
446 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
447 		       CTLTYPE_INT, "recvspace",
448 		       SYSCTL_DESCR("Default UDP receive buffer size"),
449 		       NULL, 0, &udp6_recvspace, 0,
450 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_RECVSPACE,
451 		       CTL_EOL);
452 	sysctl_createv(clog, 0, NULL, NULL,
453 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
454 		       CTLTYPE_INT, "do_loopback_cksum",
455 		       SYSCTL_DESCR("Perform UDP checksum on loopback"),
456 		       NULL, 0, &udp_do_loopback_cksum, 0,
457 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_LOOPBACKCKSUM,
458 		       CTL_EOL);
459 	sysctl_createv(clog, 0, NULL, NULL,
460 		       CTLFLAG_PERMANENT,
461 		       CTLTYPE_STRUCT, "pcblist",
462 		       SYSCTL_DESCR("UDP protocol control block list"),
463 		       sysctl_inpcblist, 0, &udbtable, 0,
464 		       CTL_NET, PF_INET6, IPPROTO_UDP, CTL_CREATE,
465 		       CTL_EOL);
466 	sysctl_createv(clog, 0, NULL, NULL,
467 		       CTLFLAG_PERMANENT,
468 		       CTLTYPE_STRUCT, "stats",
469 		       SYSCTL_DESCR("UDPv6 statistics"),
470 		       NULL, 0, &udp6stat, sizeof(udp6stat),
471 		       CTL_NET, PF_INET6, IPPROTO_UDP, UDP6CTL_STATS,
472 		       CTL_EOL);
473 }
474