vkernel build suite - change -I network from /dev/vknet to /var/run/vknet
[dragonfly.git] / sys / netinet / in_pcb.c
blob46da87e5de868f3f7f7346d3da24bd264a147aa1
1 /*
2 * Copyright (c) 2004 Jeffrey M. Hsu. All rights reserved.
3 * Copyright (c) 2004 The DragonFly Project. All rights reserved.
5 * This code is derived from software contributed to The DragonFly Project
6 * by Jeffrey M. Hsu.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of The DragonFly Project nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific, prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
25 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
30 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
35 * Copyright (c) 1982, 1986, 1991, 1993, 1995
36 * The Regents of the University of California. All rights reserved.
38 * Redistribution and use in source and binary forms, with or without
39 * modification, are permitted provided that the following conditions
40 * are met:
41 * 1. Redistributions of source code must retain the above copyright
42 * notice, this list of conditions and the following disclaimer.
43 * 2. Redistributions in binary form must reproduce the above copyright
44 * notice, this list of conditions and the following disclaimer in the
45 * documentation and/or other materials provided with the distribution.
46 * 3. All advertising materials mentioning features or use of this software
47 * must display the following acknowledgement:
48 * This product includes software developed by the University of
49 * California, Berkeley and its contributors.
50 * 4. Neither the name of the University nor the names of its contributors
51 * may be used to endorse or promote products derived from this software
52 * without specific prior written permission.
54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
64 * SUCH DAMAGE.
66 * @(#)in_pcb.c 8.4 (Berkeley) 5/24/95
67 * $FreeBSD: src/sys/netinet/in_pcb.c,v 1.59.2.27 2004/01/02 04:06:42 ambrisko Exp $
68 * $DragonFly: src/sys/netinet/in_pcb.c,v 1.48 2008/11/08 03:38:23 sephe Exp $
71 #include "opt_ipsec.h"
72 #include "opt_inet6.h"
74 #include <sys/param.h>
75 #include <sys/systm.h>
76 #include <sys/malloc.h>
77 #include <sys/mbuf.h>
78 #include <sys/domain.h>
79 #include <sys/protosw.h>
80 #include <sys/socket.h>
81 #include <sys/socketvar.h>
82 #include <sys/proc.h>
83 #include <sys/priv.h>
84 #include <sys/jail.h>
85 #include <sys/kernel.h>
86 #include <sys/sysctl.h>
87 #include <sys/thread2.h>
89 #include <machine/limits.h>
91 #include <vm/vm_zone.h>
93 #include <net/if.h>
94 #include <net/if_types.h>
95 #include <net/route.h>
97 #include <netinet/in.h>
98 #include <netinet/in_pcb.h>
99 #include <netinet/in_var.h>
100 #include <netinet/ip_var.h>
101 #ifdef INET6
102 #include <netinet/ip6.h>
103 #include <netinet6/ip6_var.h>
104 #endif /* INET6 */
106 #ifdef IPSEC
107 #include <netinet6/ipsec.h>
108 #include <netproto/key/key.h>
109 #endif
111 #ifdef FAST_IPSEC
112 #if defined(IPSEC) || defined(IPSEC_ESP)
113 #error "Bad idea: don't compile with both IPSEC and FAST_IPSEC!"
114 #endif
116 #include <netproto/ipsec/ipsec.h>
117 #include <netproto/ipsec/key.h>
118 #define IPSEC
119 #endif /* FAST_IPSEC */
121 struct in_addr zeroin_addr;
124 * These configure the range of local port addresses assigned to
125 * "unspecified" outgoing connections/packets/whatever.
127 int ipport_lowfirstauto = IPPORT_RESERVED - 1; /* 1023 */
128 int ipport_lowlastauto = IPPORT_RESERVEDSTART; /* 600 */
130 int ipport_firstauto = IPPORT_RESERVED; /* 1024 */
131 int ipport_lastauto = IPPORT_USERRESERVED; /* 5000 */
133 int ipport_hifirstauto = IPPORT_HIFIRSTAUTO; /* 49152 */
134 int ipport_hilastauto = IPPORT_HILASTAUTO; /* 65535 */
136 static __inline void
137 RANGECHK(int var, int min, int max)
139 if (var < min)
140 var = min;
141 else if (var > max)
142 var = max;
145 static int
146 sysctl_net_ipport_check(SYSCTL_HANDLER_ARGS)
148 int error;
150 error = sysctl_handle_int(oidp, oidp->oid_arg1, oidp->oid_arg2, req);
151 if (!error) {
152 RANGECHK(ipport_lowfirstauto, 1, IPPORT_RESERVED - 1);
153 RANGECHK(ipport_lowlastauto, 1, IPPORT_RESERVED - 1);
155 RANGECHK(ipport_firstauto, IPPORT_RESERVED, USHRT_MAX);
156 RANGECHK(ipport_lastauto, IPPORT_RESERVED, USHRT_MAX);
158 RANGECHK(ipport_hifirstauto, IPPORT_RESERVED, USHRT_MAX);
159 RANGECHK(ipport_hilastauto, IPPORT_RESERVED, USHRT_MAX);
161 return (error);
164 SYSCTL_NODE(_net_inet_ip, IPPROTO_IP, portrange, CTLFLAG_RW, 0, "IP Ports");
166 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, lowfirst, CTLTYPE_INT|CTLFLAG_RW,
167 &ipport_lowfirstauto, 0, &sysctl_net_ipport_check, "I", "");
168 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, lowlast, CTLTYPE_INT|CTLFLAG_RW,
169 &ipport_lowlastauto, 0, &sysctl_net_ipport_check, "I", "");
170 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, first, CTLTYPE_INT|CTLFLAG_RW,
171 &ipport_firstauto, 0, &sysctl_net_ipport_check, "I", "");
172 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, last, CTLTYPE_INT|CTLFLAG_RW,
173 &ipport_lastauto, 0, &sysctl_net_ipport_check, "I", "");
174 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, hifirst, CTLTYPE_INT|CTLFLAG_RW,
175 &ipport_hifirstauto, 0, &sysctl_net_ipport_check, "I", "");
176 SYSCTL_PROC(_net_inet_ip_portrange, OID_AUTO, hilast, CTLTYPE_INT|CTLFLAG_RW,
177 &ipport_hilastauto, 0, &sysctl_net_ipport_check, "I", "");
180 * in_pcb.c: manage the Protocol Control Blocks.
182 * NOTE: It is assumed that most of these functions will be called from
183 * a critical section. XXX - There are, unfortunately, a few exceptions
184 * to this rule that should be fixed.
186 * NOTE: The caller should initialize the cpu field to the cpu running the
187 * protocol stack associated with this inpcbinfo.
190 void
191 in_pcbinfo_init(struct inpcbinfo *pcbinfo)
193 LIST_INIT(&pcbinfo->pcblisthead);
194 pcbinfo->cpu = -1;
198 * Allocate a PCB and associate it with the socket.
201 in_pcballoc(struct socket *so, struct inpcbinfo *pcbinfo)
203 struct inpcb *inp;
204 #ifdef IPSEC
205 int error;
206 #endif
208 inp = zalloc(pcbinfo->ipi_zone);
209 if (inp == NULL)
210 return (ENOBUFS);
211 bzero(inp, sizeof *inp);
212 inp->inp_gencnt = ++pcbinfo->ipi_gencnt;
213 inp->inp_pcbinfo = inp->inp_cpcbinfo = pcbinfo;
214 inp->inp_socket = so;
215 #ifdef IPSEC
216 error = ipsec_init_policy(so, &inp->inp_sp);
217 if (error != 0) {
218 zfree(pcbinfo->ipi_zone, inp);
219 return (error);
221 #endif
222 #ifdef INET6
223 if (INP_SOCKAF(so) == AF_INET6 && ip6_v6only)
224 inp->inp_flags |= IN6P_IPV6_V6ONLY;
225 if (ip6_auto_flowlabel)
226 inp->inp_flags |= IN6P_AUTOFLOWLABEL;
227 #endif
228 so->so_pcb = inp;
229 LIST_INSERT_HEAD(&pcbinfo->pcblisthead, inp, inp_list);
230 pcbinfo->ipi_count++;
231 return (0);
235 in_pcbbind(struct inpcb *inp, struct sockaddr *nam, struct thread *td)
237 struct socket *so = inp->inp_socket;
238 struct proc *p = td->td_proc;
239 unsigned short *lastport;
240 struct sockaddr_in *sin;
241 struct sockaddr_in jsin;
242 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
243 struct ucred *cred = NULL;
244 u_short lport = 0;
245 int wild = 0, reuseport = (so->so_options & SO_REUSEPORT);
246 int error;
248 KKASSERT(p);
250 if (TAILQ_EMPTY(&in_ifaddrheads[mycpuid])) /* XXX broken! */
251 return (EADDRNOTAVAIL);
252 if (inp->inp_lport != 0 || inp->inp_laddr.s_addr != INADDR_ANY)
253 return (EINVAL); /* already bound */
254 if (!(so->so_options & (SO_REUSEADDR|SO_REUSEPORT)))
255 wild = 1; /* neither SO_REUSEADDR nor SO_REUSEPORT is set */
256 if (p)
257 cred = p->p_ucred;
258 if (nam != NULL) {
259 sin = (struct sockaddr_in *)nam;
260 if (nam->sa_len != sizeof *sin)
261 return (EINVAL);
262 #ifdef notdef
264 * We should check the family, but old programs
265 * incorrectly fail to initialize it.
267 if (sin->sin_family != AF_INET)
268 return (EAFNOSUPPORT);
269 #endif
270 if (!prison_replace_wildcards(td, nam))
271 return (EINVAL);
272 lport = sin->sin_port;
273 if (IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
275 * Treat SO_REUSEADDR as SO_REUSEPORT for multicast;
276 * allow complete duplication of binding if
277 * SO_REUSEPORT is set, or if SO_REUSEADDR is set
278 * and a multicast address is bound on both
279 * new and duplicated sockets.
281 if (so->so_options & SO_REUSEADDR)
282 reuseport = SO_REUSEADDR | SO_REUSEPORT;
283 } else if (sin->sin_addr.s_addr != INADDR_ANY) {
284 sin->sin_port = 0; /* yech... */
285 bzero(&sin->sin_zero, sizeof sin->sin_zero);
286 if (ifa_ifwithaddr((struct sockaddr *)sin) == NULL)
287 return (EADDRNOTAVAIL);
289 if (lport != 0) {
290 struct inpcb *t;
292 /* GROSS */
293 if (ntohs(lport) < IPPORT_RESERVED &&
294 cred && priv_check_cred(cred, PRIV_NETINET_RESERVEDPORT, 0))
295 return (EACCES);
296 if (so->so_cred->cr_uid != 0 &&
297 !IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
298 t = in_pcblookup_local(inp->inp_pcbinfo,
299 sin->sin_addr, lport,
300 INPLOOKUP_WILDCARD, cred);
301 if (t &&
302 (!in_nullhost(sin->sin_addr) ||
303 !in_nullhost(t->inp_laddr) ||
304 (t->inp_socket->so_options &
305 SO_REUSEPORT) == 0) &&
306 (so->so_cred->cr_uid !=
307 t->inp_socket->so_cred->cr_uid)) {
308 #ifdef INET6
309 if (!in_nullhost(sin->sin_addr) ||
310 !in_nullhost(t->inp_laddr) ||
311 INP_SOCKAF(so) ==
312 INP_SOCKAF(t->inp_socket))
313 #endif
314 return (EADDRINUSE);
317 if (cred && !prison_replace_wildcards(td, nam))
318 return (EADDRNOTAVAIL);
319 t = in_pcblookup_local(pcbinfo, sin->sin_addr, lport,
320 wild, cred);
321 if (t && !(reuseport & t->inp_socket->so_options)) {
322 #ifdef INET6
323 if (!in_nullhost(sin->sin_addr) ||
324 !in_nullhost(t->inp_laddr) ||
325 INP_SOCKAF(so) == INP_SOCKAF(t->inp_socket))
326 #endif
327 return (EADDRINUSE);
330 inp->inp_laddr = sin->sin_addr;
332 if (lport == 0) {
333 ushort first, last;
334 int count;
336 jsin.sin_family = AF_INET;
337 jsin.sin_addr.s_addr = inp->inp_laddr.s_addr;
338 if (!prison_replace_wildcards(td, (struct sockaddr *)&jsin)) {
339 inp->inp_laddr.s_addr = INADDR_ANY;
340 return (EINVAL);
342 inp->inp_laddr.s_addr = jsin.sin_addr.s_addr;
344 inp->inp_flags |= INP_ANONPORT;
346 if (inp->inp_flags & INP_HIGHPORT) {
347 first = ipport_hifirstauto; /* sysctl */
348 last = ipport_hilastauto;
349 lastport = &pcbinfo->lasthi;
350 } else if (inp->inp_flags & INP_LOWPORT) {
351 if (cred &&
352 (error = priv_check_cred(cred, PRIV_NETINET_RESERVEDPORT, 0))) {
353 inp->inp_laddr.s_addr = INADDR_ANY;
354 return (error);
356 first = ipport_lowfirstauto; /* 1023 */
357 last = ipport_lowlastauto; /* 600 */
358 lastport = &pcbinfo->lastlow;
359 } else {
360 first = ipport_firstauto; /* sysctl */
361 last = ipport_lastauto;
362 lastport = &pcbinfo->lastport;
365 * Simple check to ensure all ports are not used up causing
366 * a deadlock here.
368 * We split the two cases (up and down) so that the direction
369 * is not being tested on each round of the loop.
371 if (first > last) {
373 * counting down
375 count = first - last;
377 do {
378 if (count-- < 0) { /* completely used? */
379 inp->inp_laddr.s_addr = INADDR_ANY;
380 return (EADDRNOTAVAIL);
382 --*lastport;
383 if (*lastport > first || *lastport < last)
384 *lastport = first;
385 lport = htons(*lastport);
386 } while (in_pcblookup_local(pcbinfo, inp->inp_laddr,
387 lport, wild, cred));
388 } else {
390 * counting up
392 count = last - first;
394 do {
395 if (count-- < 0) { /* completely used? */
396 inp->inp_laddr.s_addr = INADDR_ANY;
397 return (EADDRNOTAVAIL);
399 ++*lastport;
400 if (*lastport < first || *lastport > last)
401 *lastport = first;
402 lport = htons(*lastport);
403 } while (in_pcblookup_local(pcbinfo, inp->inp_laddr,
404 lport, wild, cred));
407 inp->inp_lport = lport;
409 jsin.sin_family = AF_INET;
410 jsin.sin_addr.s_addr = inp->inp_laddr.s_addr;
411 if (!prison_replace_wildcards(td, (struct sockaddr*)&jsin)) {
412 inp->inp_laddr.s_addr = INADDR_ANY;
413 inp->inp_lport = 0;
414 return (EINVAL);
416 inp->inp_laddr.s_addr = jsin.sin_addr.s_addr;
418 if (in_pcbinsporthash(inp) != 0) {
419 inp->inp_laddr.s_addr = INADDR_ANY;
420 inp->inp_lport = 0;
421 return (EAGAIN);
423 return (0);
427 * Transform old in_pcbconnect() into an inner subroutine for new
428 * in_pcbconnect(): Do some validity-checking on the remote
429 * address (in mbuf 'nam') and then determine local host address
430 * (i.e., which interface) to use to access that remote host.
432 * This preserves definition of in_pcbconnect(), while supporting a
433 * slightly different version for T/TCP. (This is more than
434 * a bit of a kludge, but cleaning up the internal interfaces would
435 * have forced minor changes in every protocol).
438 in_pcbladdr(struct inpcb *inp, struct sockaddr *nam,
439 struct sockaddr_in **plocal_sin, struct thread *td)
441 struct in_ifaddr *ia;
442 struct ucred *cred = NULL;
443 struct sockaddr_in *sin = (struct sockaddr_in *)nam;
444 struct sockaddr *jsin;
445 int jailed = 0, alloc_route = 0;
447 if (nam->sa_len != sizeof *sin)
448 return (EINVAL);
449 if (sin->sin_family != AF_INET)
450 return (EAFNOSUPPORT);
451 if (sin->sin_port == 0)
452 return (EADDRNOTAVAIL);
453 if (td && td->td_proc && td->td_proc->p_ucred)
454 cred = td->td_proc->p_ucred;
455 if (cred && cred->cr_prison)
456 jailed = 1;
457 if (!TAILQ_EMPTY(&in_ifaddrheads[mycpuid])) {
458 ia = TAILQ_FIRST(&in_ifaddrheads[mycpuid])->ia;
460 * If the destination address is INADDR_ANY,
461 * use the primary local address.
462 * If the supplied address is INADDR_BROADCAST,
463 * and the primary interface supports broadcast,
464 * choose the broadcast address for that interface.
466 if (sin->sin_addr.s_addr == INADDR_ANY)
467 sin->sin_addr = IA_SIN(ia)->sin_addr;
468 else if (sin->sin_addr.s_addr == (u_long)INADDR_BROADCAST &&
469 (ia->ia_ifp->if_flags & IFF_BROADCAST))
470 sin->sin_addr = satosin(&ia->ia_broadaddr)->sin_addr;
472 if (inp->inp_laddr.s_addr == INADDR_ANY) {
473 struct route *ro;
475 ia = NULL;
477 * If route is known or can be allocated now,
478 * our src addr is taken from the i/f, else punt.
479 * Note that we should check the address family of the cached
480 * destination, in case of sharing the cache with IPv6.
482 ro = &inp->inp_route;
483 if (ro->ro_rt &&
484 (!(ro->ro_rt->rt_flags & RTF_UP) ||
485 ro->ro_dst.sa_family != AF_INET ||
486 satosin(&ro->ro_dst)->sin_addr.s_addr !=
487 sin->sin_addr.s_addr ||
488 inp->inp_socket->so_options & SO_DONTROUTE)) {
489 RTFREE(ro->ro_rt);
490 ro->ro_rt = NULL;
492 if (!(inp->inp_socket->so_options & SO_DONTROUTE) && /*XXX*/
493 (ro->ro_rt == NULL ||
494 ro->ro_rt->rt_ifp == NULL)) {
495 /* No route yet, so try to acquire one */
496 bzero(&ro->ro_dst, sizeof(struct sockaddr_in));
497 ro->ro_dst.sa_family = AF_INET;
498 ro->ro_dst.sa_len = sizeof(struct sockaddr_in);
499 ((struct sockaddr_in *) &ro->ro_dst)->sin_addr =
500 sin->sin_addr;
501 rtalloc(ro);
502 alloc_route = 1;
505 * If we found a route, use the address
506 * corresponding to the outgoing interface
507 * unless it is the loopback (in case a route
508 * to our address on another net goes to loopback).
510 if (ro->ro_rt && !(ro->ro_rt->rt_ifp->if_flags & IFF_LOOPBACK)) {
511 if (jailed) {
512 if (jailed_ip(cred->cr_prison,
513 ro->ro_rt->rt_ifa->ifa_addr)) {
514 ia = ifatoia(ro->ro_rt->rt_ifa);
516 } else {
517 ia = ifatoia(ro->ro_rt->rt_ifa);
520 if (ia == NULL) {
521 u_short fport = sin->sin_port;
523 sin->sin_port = 0;
524 ia = ifatoia(ifa_ifwithdstaddr(sintosa(sin)));
525 if (ia && jailed && !jailed_ip(cred->cr_prison,
526 sintosa(&ia->ia_addr)))
527 ia = NULL;
528 if (ia == NULL)
529 ia = ifatoia(ifa_ifwithnet(sintosa(sin)));
530 if (ia && jailed && !jailed_ip(cred->cr_prison,
531 sintosa(&ia->ia_addr)))
532 ia = NULL;
533 sin->sin_port = fport;
534 if (ia == NULL &&
535 !TAILQ_EMPTY(&in_ifaddrheads[mycpuid]))
536 ia = TAILQ_FIRST(&in_ifaddrheads[mycpuid])->ia;
537 if (ia && jailed && !jailed_ip(cred->cr_prison,
538 sintosa(&ia->ia_addr)))
539 ia = NULL;
541 if (!jailed && ia == NULL)
542 goto fail;
545 * If the destination address is multicast and an outgoing
546 * interface has been set as a multicast option, use the
547 * address of that interface as our source address.
549 if (!jailed && IN_MULTICAST(ntohl(sin->sin_addr.s_addr)) &&
550 inp->inp_moptions != NULL) {
551 struct ip_moptions *imo;
552 struct ifnet *ifp;
554 imo = inp->inp_moptions;
555 if (imo->imo_multicast_ifp != NULL) {
556 struct in_ifaddr_container *iac;
558 ifp = imo->imo_multicast_ifp;
559 ia = NULL;
560 TAILQ_FOREACH(iac,
561 &in_ifaddrheads[mycpuid], ia_link) {
562 if (iac->ia->ia_ifp == ifp) {
563 ia = iac->ia;
564 break;
567 if (ia == NULL)
568 goto fail;
572 * Don't do pcblookup call here; return interface in plocal_sin
573 * and exit to caller, that will do the lookup.
575 if (ia == NULL && jailed) {
576 if ((jsin = prison_get_nonlocal(cred->cr_prison, AF_INET, NULL)) != NULL ||
577 (jsin = prison_get_local(cred->cr_prison, AF_INET, NULL)) != NULL) {
578 *plocal_sin = satosin(jsin);
579 } else {
580 /* IPv6 only Jail */
581 goto fail;
583 } else {
584 *plocal_sin = &ia->ia_addr;
587 return (0);
588 fail:
589 if (alloc_route) {
590 struct route *ro = &inp->inp_route;
592 if (ro->ro_rt != NULL)
593 RTFREE(ro->ro_rt);
594 bzero(ro, sizeof(*ro));
596 return (EADDRNOTAVAIL);
600 * Outer subroutine:
601 * Connect from a socket to a specified address.
602 * Both address and port must be specified in argument sin.
603 * If don't have a local address for this socket yet,
604 * then pick one.
607 in_pcbconnect(struct inpcb *inp, struct sockaddr *nam, struct thread *td)
609 struct sockaddr_in *if_sin;
610 struct sockaddr_in *sin = (struct sockaddr_in *)nam;
611 int error;
613 /* Call inner routine to assign local interface address. */
614 if ((error = in_pcbladdr(inp, nam, &if_sin, td)) != 0)
615 return (error);
617 if (in_pcblookup_hash(inp->inp_cpcbinfo, sin->sin_addr, sin->sin_port,
618 inp->inp_laddr.s_addr ? inp->inp_laddr : if_sin->sin_addr,
619 inp->inp_lport, FALSE, NULL) != NULL) {
620 return (EADDRINUSE);
622 if (inp->inp_laddr.s_addr == INADDR_ANY) {
623 if (inp->inp_lport == 0) {
624 error = in_pcbbind(inp, NULL, td);
625 if (error)
626 return (error);
628 inp->inp_laddr = if_sin->sin_addr;
630 inp->inp_faddr = sin->sin_addr;
631 inp->inp_fport = sin->sin_port;
632 in_pcbinsconnhash(inp);
633 return (0);
636 void
637 in_pcbdisconnect(struct inpcb *inp)
640 inp->inp_faddr.s_addr = INADDR_ANY;
641 inp->inp_fport = 0;
642 in_pcbremconnhash(inp);
643 if (inp->inp_socket->so_state & SS_NOFDREF)
644 in_pcbdetach(inp);
647 void
648 in_pcbdetach(struct inpcb *inp)
650 struct socket *so = inp->inp_socket;
651 struct inpcbinfo *ipi = inp->inp_pcbinfo;
653 #ifdef IPSEC
654 ipsec4_delete_pcbpolicy(inp);
655 #endif /*IPSEC*/
656 inp->inp_gencnt = ++ipi->ipi_gencnt;
657 in_pcbremlists(inp);
658 so->so_pcb = 0;
659 sofree(so);
660 if (inp->inp_options)
661 m_free(inp->inp_options);
662 if (inp->inp_route.ro_rt)
663 rtfree(inp->inp_route.ro_rt);
664 ip_freemoptions(inp->inp_moptions);
665 inp->inp_vflag = 0;
666 zfree(ipi->ipi_zone, inp);
670 * The calling convention of in_setsockaddr() and in_setpeeraddr() was
671 * modified to match the pru_sockaddr() and pru_peeraddr() entry points
672 * in struct pr_usrreqs, so that protocols can just reference then directly
673 * without the need for a wrapper function. The socket must have a valid
674 * (i.e., non-nil) PCB, but it should be impossible to get an invalid one
675 * except through a kernel programming error, so it is acceptable to panic
676 * (or in this case trap) if the PCB is invalid. (Actually, we don't trap
677 * because there actually /is/ a programming error somewhere... XXX)
680 in_setsockaddr(struct socket *so, struct sockaddr **nam)
682 struct inpcb *inp;
683 struct sockaddr_in *sin;
686 * Do the malloc first in case it blocks.
688 MALLOC(sin, struct sockaddr_in *, sizeof *sin, M_SONAME,
689 M_WAITOK | M_ZERO);
690 sin->sin_family = AF_INET;
691 sin->sin_len = sizeof *sin;
693 crit_enter();
694 inp = so->so_pcb;
695 if (!inp) {
696 crit_exit();
697 kfree(sin, M_SONAME);
698 return (ECONNRESET);
700 sin->sin_port = inp->inp_lport;
701 sin->sin_addr = inp->inp_laddr;
702 crit_exit();
704 *nam = (struct sockaddr *)sin;
705 return (0);
709 in_setpeeraddr(struct socket *so, struct sockaddr **nam)
711 struct inpcb *inp;
712 struct sockaddr_in *sin;
715 * Do the malloc first in case it blocks.
717 MALLOC(sin, struct sockaddr_in *, sizeof *sin, M_SONAME,
718 M_WAITOK | M_ZERO);
719 sin->sin_family = AF_INET;
720 sin->sin_len = sizeof *sin;
722 crit_enter();
723 inp = so->so_pcb;
724 if (!inp) {
725 crit_exit();
726 kfree(sin, M_SONAME);
727 return (ECONNRESET);
729 sin->sin_port = inp->inp_fport;
730 sin->sin_addr = inp->inp_faddr;
731 crit_exit();
733 *nam = (struct sockaddr *)sin;
734 return (0);
737 void
738 in_pcbnotifyall(struct inpcbhead *head, struct in_addr faddr, int err,
739 void (*notify)(struct inpcb *, int))
741 struct inpcb *inp, *ninp;
744 * note: if INP_PLACEMARKER is set we must ignore the rest of
745 * the structure and skip it.
747 crit_enter();
748 LIST_FOREACH_MUTABLE(inp, head, inp_list, ninp) {
749 if (inp->inp_flags & INP_PLACEMARKER)
750 continue;
751 #ifdef INET6
752 if (!(inp->inp_vflag & INP_IPV4))
753 continue;
754 #endif
755 if (inp->inp_faddr.s_addr != faddr.s_addr ||
756 inp->inp_socket == NULL)
757 continue;
758 (*notify)(inp, err); /* can remove inp from list! */
760 crit_exit();
763 void
764 in_pcbpurgeif0(struct inpcb *head, struct ifnet *ifp)
766 struct inpcb *inp;
767 struct ip_moptions *imo;
768 int i, gap;
770 for (inp = head; inp != NULL; inp = LIST_NEXT(inp, inp_list)) {
771 if (inp->inp_flags & INP_PLACEMARKER)
772 continue;
773 imo = inp->inp_moptions;
774 if ((inp->inp_vflag & INP_IPV4) && imo != NULL) {
776 * Unselect the outgoing interface if it is being
777 * detached.
779 if (imo->imo_multicast_ifp == ifp)
780 imo->imo_multicast_ifp = NULL;
783 * Drop multicast group membership if we joined
784 * through the interface being detached.
786 for (i = 0, gap = 0; i < imo->imo_num_memberships;
787 i++) {
788 if (imo->imo_membership[i]->inm_ifp == ifp) {
789 in_delmulti(imo->imo_membership[i]);
790 gap++;
791 } else if (gap != 0)
792 imo->imo_membership[i - gap] =
793 imo->imo_membership[i];
795 imo->imo_num_memberships -= gap;
801 * Check for alternatives when higher level complains
802 * about service problems. For now, invalidate cached
803 * routing information. If the route was created dynamically
804 * (by a redirect), time to try a default gateway again.
806 void
807 in_losing(struct inpcb *inp)
809 struct rtentry *rt;
810 struct rt_addrinfo rtinfo;
812 if ((rt = inp->inp_route.ro_rt)) {
813 bzero(&rtinfo, sizeof(struct rt_addrinfo));
814 rtinfo.rti_info[RTAX_DST] = rt_key(rt);
815 rtinfo.rti_info[RTAX_GATEWAY] = rt->rt_gateway;
816 rtinfo.rti_info[RTAX_NETMASK] = rt_mask(rt);
817 rtinfo.rti_flags = rt->rt_flags;
818 rt_missmsg(RTM_LOSING, &rtinfo, rt->rt_flags, 0);
819 if (rt->rt_flags & RTF_DYNAMIC)
820 rtrequest1_global(RTM_DELETE, &rtinfo, NULL, NULL);
821 inp->inp_route.ro_rt = NULL;
822 rtfree(rt);
824 * A new route can be allocated
825 * the next time output is attempted.
831 * After a routing change, flush old routing
832 * and allocate a (hopefully) better one.
834 void
835 in_rtchange(struct inpcb *inp, int err)
837 if (inp->inp_route.ro_rt) {
838 rtfree(inp->inp_route.ro_rt);
839 inp->inp_route.ro_rt = NULL;
841 * A new route can be allocated the next time
842 * output is attempted.
848 * Lookup a PCB based on the local address and port.
850 struct inpcb *
851 in_pcblookup_local(struct inpcbinfo *pcbinfo, struct in_addr laddr,
852 u_int lport_arg, int wild_okay, struct ucred *cred)
854 struct inpcb *inp;
855 int matchwild = 3, wildcard;
856 u_short lport = lport_arg;
858 struct inpcbporthead *porthash;
859 struct inpcbport *phd;
860 struct inpcb *match = NULL;
863 * Best fit PCB lookup.
865 * First see if this local port is in use by looking on the
866 * port hash list.
868 porthash = &pcbinfo->porthashbase[INP_PCBPORTHASH(lport,
869 pcbinfo->porthashmask)];
870 LIST_FOREACH(phd, porthash, phd_hash) {
871 if (phd->phd_port == lport)
872 break;
874 if (phd != NULL) {
876 * Port is in use by one or more PCBs. Look for best
877 * fit.
879 LIST_FOREACH(inp, &phd->phd_pcblist, inp_portlist) {
880 wildcard = 0;
881 #ifdef INET6
882 if ((inp->inp_vflag & INP_IPV4) == 0)
883 continue;
884 #endif
885 if (inp->inp_faddr.s_addr != INADDR_ANY)
886 wildcard++;
887 if (inp->inp_laddr.s_addr != INADDR_ANY) {
888 if (laddr.s_addr == INADDR_ANY)
889 wildcard++;
890 else if (inp->inp_laddr.s_addr != laddr.s_addr)
891 continue;
892 } else {
893 if (laddr.s_addr != INADDR_ANY)
894 wildcard++;
896 if (wildcard && !wild_okay)
897 continue;
898 if (wildcard < matchwild &&
899 (cred == NULL ||
900 cred->cr_prison ==
901 inp->inp_socket->so_cred->cr_prison)) {
902 match = inp;
903 matchwild = wildcard;
904 if (matchwild == 0) {
905 break;
910 return (match);
914 * Lookup PCB in hash list.
916 struct inpcb *
917 in_pcblookup_hash(struct inpcbinfo *pcbinfo, struct in_addr faddr, u_int fport_arg,
918 struct in_addr laddr, u_int lport_arg, boolean_t wildcard,
919 struct ifnet *ifp)
921 struct inpcbhead *head;
922 struct inpcb *inp, *jinp=NULL;
923 u_short fport = fport_arg, lport = lport_arg;
926 * First look for an exact match.
928 head = &pcbinfo->hashbase[INP_PCBCONNHASH(faddr.s_addr, fport,
929 laddr.s_addr, lport, pcbinfo->hashmask)];
930 LIST_FOREACH(inp, head, inp_hash) {
931 #ifdef INET6
932 if (!(inp->inp_vflag & INP_IPV4))
933 continue;
934 #endif
935 if (in_hosteq(inp->inp_faddr, faddr) &&
936 in_hosteq(inp->inp_laddr, laddr) &&
937 inp->inp_fport == fport && inp->inp_lport == lport) {
938 /* found */
939 if (inp->inp_socket == NULL ||
940 inp->inp_socket->so_cred->cr_prison == NULL) {
941 return (inp);
942 } else {
943 if (jinp == NULL)
944 jinp = inp;
948 if (jinp != NULL)
949 return (jinp);
950 if (wildcard) {
951 struct inpcb *local_wild = NULL;
952 struct inpcb *jinp_wild = NULL;
953 #ifdef INET6
954 struct inpcb *local_wild_mapped = NULL;
955 #endif
956 struct inpcontainer *ic;
957 struct inpcontainerhead *chead;
958 struct sockaddr_in jsin;
959 struct ucred *cred;
962 * Order of socket selection:
963 * 1. non-jailed, non-wild.
964 * 2. non-jailed, wild.
965 * 3. jailed, non-wild.
966 * 4. jailed, wild.
968 jsin.sin_family = AF_INET;
969 chead = &pcbinfo->wildcardhashbase[
970 INP_PCBWILDCARDHASH(lport, pcbinfo->wildcardhashmask)];
971 LIST_FOREACH(ic, chead, ic_list) {
972 inp = ic->ic_inp;
973 jsin.sin_addr.s_addr = laddr.s_addr;
974 #ifdef INET6
975 if (!(inp->inp_vflag & INP_IPV4))
976 continue;
977 #endif
978 if (inp->inp_socket != NULL)
979 cred = inp->inp_socket->so_cred;
980 else
981 cred = NULL;
982 if (cred != NULL && jailed(cred)) {
983 if (jinp != NULL)
984 continue;
985 else
986 if (!jailed_ip(cred->cr_prison,
987 (struct sockaddr *)&jsin))
988 continue;
990 if (inp->inp_lport == lport) {
991 if (ifp && ifp->if_type == IFT_FAITH &&
992 !(inp->inp_flags & INP_FAITH))
993 continue;
994 if (inp->inp_laddr.s_addr == laddr.s_addr) {
995 if (cred != NULL && jailed(cred))
996 jinp = inp;
997 else
998 return (inp);
1000 if (inp->inp_laddr.s_addr == INADDR_ANY) {
1001 #ifdef INET6
1002 if (INP_CHECK_SOCKAF(inp->inp_socket,
1003 AF_INET6))
1004 local_wild_mapped = inp;
1005 else
1006 #endif
1007 if (cred != NULL &&
1008 jailed(cred))
1009 jinp_wild = inp;
1010 else
1011 local_wild = inp;
1015 if (local_wild != NULL)
1016 return (local_wild);
1017 #ifdef INET6
1018 if (local_wild_mapped != NULL)
1019 return (local_wild_mapped);
1020 #endif
1021 if (jinp != NULL)
1022 return (jinp);
1023 return (jinp_wild);
1027 * Not found.
1029 return (NULL);
1033 * Insert PCB into connection hash table.
1035 void
1036 in_pcbinsconnhash(struct inpcb *inp)
1038 struct inpcbinfo *pcbinfo = inp->inp_cpcbinfo;
1039 struct inpcbhead *bucket;
1040 u_int32_t hashkey_faddr, hashkey_laddr;
1042 #ifdef INET6
1043 if (inp->inp_vflag & INP_IPV6) {
1044 hashkey_faddr = inp->in6p_faddr.s6_addr32[3] /* XXX JH */;
1045 hashkey_laddr = inp->in6p_laddr.s6_addr32[3] /* XXX JH */;
1046 } else {
1047 #endif
1048 hashkey_faddr = inp->inp_faddr.s_addr;
1049 hashkey_laddr = inp->inp_laddr.s_addr;
1050 #ifdef INET6
1052 #endif
1054 KASSERT(!(inp->inp_flags & INP_CONNECTED), ("already on hash list"));
1055 inp->inp_flags |= INP_CONNECTED;
1058 * Insert into the connection hash table.
1060 bucket = &pcbinfo->hashbase[INP_PCBCONNHASH(hashkey_faddr,
1061 inp->inp_fport, hashkey_laddr, inp->inp_lport, pcbinfo->hashmask)];
1062 LIST_INSERT_HEAD(bucket, inp, inp_hash);
1066 * Remove PCB from connection hash table.
1068 void
1069 in_pcbremconnhash(struct inpcb *inp)
1071 KASSERT(inp->inp_flags & INP_CONNECTED, ("inp not connected"));
1072 LIST_REMOVE(inp, inp_hash);
1073 inp->inp_flags &= ~INP_CONNECTED;
1077 * Insert PCB into port hash table.
1080 in_pcbinsporthash(struct inpcb *inp)
1082 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
1083 struct inpcbporthead *pcbporthash;
1084 struct inpcbport *phd;
1087 * Insert into the port hash table.
1089 pcbporthash = &pcbinfo->porthashbase[
1090 INP_PCBPORTHASH(inp->inp_lport, pcbinfo->porthashmask)];
1092 /* Go through port list and look for a head for this lport. */
1093 LIST_FOREACH(phd, pcbporthash, phd_hash)
1094 if (phd->phd_port == inp->inp_lport)
1095 break;
1097 /* If none exists, malloc one and tack it on. */
1098 if (phd == NULL) {
1099 MALLOC(phd, struct inpcbport *, sizeof(struct inpcbport),
1100 M_PCB, M_INTWAIT | M_NULLOK);
1101 if (phd == NULL)
1102 return (ENOBUFS); /* XXX */
1103 phd->phd_port = inp->inp_lport;
1104 LIST_INIT(&phd->phd_pcblist);
1105 LIST_INSERT_HEAD(pcbporthash, phd, phd_hash);
1108 inp->inp_phd = phd;
1109 LIST_INSERT_HEAD(&phd->phd_pcblist, inp, inp_portlist);
1111 return (0);
1114 void
1115 in_pcbinswildcardhash_oncpu(struct inpcb *inp, struct inpcbinfo *pcbinfo)
1117 struct inpcontainer *ic;
1118 struct inpcontainerhead *bucket;
1120 bucket = &pcbinfo->wildcardhashbase[
1121 INP_PCBWILDCARDHASH(inp->inp_lport, pcbinfo->wildcardhashmask)];
1123 ic = kmalloc(sizeof(struct inpcontainer), M_TEMP, M_INTWAIT);
1124 ic->ic_inp = inp;
1125 LIST_INSERT_HEAD(bucket, ic, ic_list);
1129 * Insert PCB into wildcard hash table.
1131 void
1132 in_pcbinswildcardhash(struct inpcb *inp)
1134 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
1136 KKASSERT(pcbinfo != NULL);
1138 in_pcbinswildcardhash_oncpu(inp, pcbinfo);
1139 inp->inp_flags |= INP_WILDCARD;
1142 void
1143 in_pcbremwildcardhash_oncpu(struct inpcb *inp, struct inpcbinfo *pcbinfo)
1145 struct inpcontainer *ic;
1146 struct inpcontainerhead *head;
1148 /* find bucket */
1149 head = &pcbinfo->wildcardhashbase[
1150 INP_PCBWILDCARDHASH(inp->inp_lport, pcbinfo->wildcardhashmask)];
1152 LIST_FOREACH(ic, head, ic_list) {
1153 if (ic->ic_inp == inp)
1154 goto found;
1156 return; /* not found! */
1158 found:
1159 LIST_REMOVE(ic, ic_list); /* remove container from bucket chain */
1160 kfree(ic, M_TEMP); /* deallocate container */
1164 * Remove PCB from wildcard hash table.
1166 void
1167 in_pcbremwildcardhash(struct inpcb *inp)
1169 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
1171 KASSERT(inp->inp_flags & INP_WILDCARD, ("inp not wildcard"));
1172 in_pcbremwildcardhash_oncpu(inp, pcbinfo);
1173 inp->inp_flags &= ~INP_WILDCARD;
1177 * Remove PCB from various lists.
1179 void
1180 in_pcbremlists(struct inpcb *inp)
1182 if (inp->inp_lport) {
1183 struct inpcbport *phd = inp->inp_phd;
1185 LIST_REMOVE(inp, inp_portlist);
1186 if (LIST_FIRST(&phd->phd_pcblist) == NULL) {
1187 LIST_REMOVE(phd, phd_hash);
1188 kfree(phd, M_PCB);
1191 if (inp->inp_flags & INP_WILDCARD) {
1192 in_pcbremwildcardhash(inp);
1193 } else if (inp->inp_flags & INP_CONNECTED) {
1194 in_pcbremconnhash(inp);
1196 LIST_REMOVE(inp, inp_list);
1197 inp->inp_pcbinfo->ipi_count--;
1201 prison_xinpcb(struct thread *td, struct inpcb *inp)
1203 struct ucred *cr;
1205 if (td->td_proc == NULL)
1206 return (0);
1207 cr = td->td_proc->p_ucred;
1208 if (cr->cr_prison == NULL)
1209 return (0);
1210 if (inp->inp_socket && inp->inp_socket->so_cred &&
1211 inp->inp_socket->so_cred->cr_prison &&
1212 cr->cr_prison == inp->inp_socket->so_cred->cr_prison)
1213 return (0);
1214 return (1);
1218 in_pcblist_global(SYSCTL_HANDLER_ARGS)
1220 struct inpcbinfo *pcbinfo = arg1;
1221 struct inpcb *inp, *marker;
1222 struct xinpcb xi;
1223 int error, i, n;
1224 inp_gen_t gencnt;
1227 * The process of preparing the TCB list is too time-consuming and
1228 * resource-intensive to repeat twice on every request.
1230 if (req->oldptr == NULL) {
1231 n = pcbinfo->ipi_count;
1232 req->oldidx = (n + n/8 + 10) * sizeof(struct xinpcb);
1233 return 0;
1236 if (req->newptr != NULL)
1237 return EPERM;
1240 * OK, now we're committed to doing something. Re-fetch ipi_count
1241 * after obtaining the generation count.
1243 gencnt = pcbinfo->ipi_gencnt;
1244 n = pcbinfo->ipi_count;
1246 marker = kmalloc(sizeof(struct inpcb), M_TEMP, M_WAITOK|M_ZERO);
1247 marker->inp_flags |= INP_PLACEMARKER;
1248 LIST_INSERT_HEAD(&pcbinfo->pcblisthead, marker, inp_list);
1250 i = 0;
1251 error = 0;
1253 while ((inp = LIST_NEXT(marker, inp_list)) != NULL && i < n) {
1254 LIST_REMOVE(marker, inp_list);
1255 LIST_INSERT_AFTER(inp, marker, inp_list);
1257 if (inp->inp_flags & INP_PLACEMARKER)
1258 continue;
1259 if (inp->inp_gencnt > gencnt)
1260 continue;
1261 if (prison_xinpcb(req->td, inp))
1262 continue;
1263 bzero(&xi, sizeof xi);
1264 xi.xi_len = sizeof xi;
1265 bcopy(inp, &xi.xi_inp, sizeof *inp);
1266 if (inp->inp_socket)
1267 sotoxsocket(inp->inp_socket, &xi.xi_socket);
1268 if ((error = SYSCTL_OUT(req, &xi, sizeof xi)) != 0)
1269 break;
1270 ++i;
1272 LIST_REMOVE(marker, inp_list);
1273 if (error == 0 && i < n) {
1274 bzero(&xi, sizeof xi);
1275 xi.xi_len = sizeof xi;
1276 while (i < n) {
1277 error = SYSCTL_OUT(req, &xi, sizeof xi);
1278 ++i;
1281 kfree(marker, M_TEMP);
1282 return(error);