blob: f77e00f5a072d0ad203eec31fe09cea34d2e4e29 [file] [log] [blame]
bellardf0cbd3e2004-04-22 00:10:48 +00001/*
2 * Copyright (c) 1982, 1986, 1988, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
aliguori2f5f8992009-01-26 19:37:41 +000013 * 3. Neither the name of the University nor the names of its contributors
bellardf0cbd3e2004-04-22 00:10:48 +000014 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 * @(#)udp_usrreq.c 8.4 (Berkeley) 1/21/94
30 * udp_usrreq.c,v 1.4 1994/10/02 17:48:45 phk Exp
31 */
32
33/*
34 * Changes and additions relating to SLiRP
35 * Copyright (c) 1995 Danny Gasparovski.
ths5fafdf22007-09-16 21:08:06 +000036 *
37 * Please read the file COPYRIGHT for the
bellardf0cbd3e2004-04-22 00:10:48 +000038 * terms and conditions of the copyright.
39 */
40
41#include <slirp.h>
42#include "ip_icmp.h"
43
Stefan Weilb6dce922010-07-22 22:15:23 +020044static uint8_t udp_tos(struct socket *so);
blueswir19634d902007-10-26 19:01:16 +000045
bellardf0cbd3e2004-04-22 00:10:48 +000046void
Jan Kiszka460fec62009-06-24 14:42:31 +020047udp_init(Slirp *slirp)
bellardf0cbd3e2004-04-22 00:10:48 +000048{
Jan Kiszka460fec62009-06-24 14:42:31 +020049 slirp->udb.so_next = slirp->udb.so_prev = &slirp->udb;
50 slirp->udp_last_so = &slirp->udb;
bellardf0cbd3e2004-04-22 00:10:48 +000051}
Jan Kiszkaa68adc22012-02-29 19:14:23 +010052
53void udp_cleanup(Slirp *slirp)
54{
55 while (slirp->udb.so_next != &slirp->udb) {
56 udp_detach(slirp->udb.so_next);
57 }
58}
59
ths5fafdf22007-09-16 21:08:06 +000060/* m->m_data points at ip packet header
61 * m->m_len length ip packet
bellardf0cbd3e2004-04-22 00:10:48 +000062 * ip->ip_len length data (IPDU)
63 */
64void
blueswir1aeed97c2009-04-18 07:32:41 +000065udp_input(register struct mbuf *m, int iphlen)
bellardf0cbd3e2004-04-22 00:10:48 +000066{
Jan Kiszka460fec62009-06-24 14:42:31 +020067 Slirp *slirp = m->slirp;
bellardf0cbd3e2004-04-22 00:10:48 +000068 register struct ip *ip;
69 register struct udphdr *uh;
bellardf0cbd3e2004-04-22 00:10:48 +000070 int len;
ths5fafdf22007-09-16 21:08:06 +000071 struct ip save_ip;
bellardf0cbd3e2004-04-22 00:10:48 +000072 struct socket *so;
ths5fafdf22007-09-16 21:08:06 +000073
bellardf0cbd3e2004-04-22 00:10:48 +000074 DEBUG_CALL("udp_input");
75 DEBUG_ARG("m = %lx", (long)m);
76 DEBUG_ARG("iphlen = %d", iphlen);
ths5fafdf22007-09-16 21:08:06 +000077
bellardf0cbd3e2004-04-22 00:10:48 +000078 /*
79 * Strip IP options, if any; should skip this,
80 * make available to user, and use on returned packets,
81 * but we don't yet have a way to check the checksum
82 * with options still present.
83 */
84 if(iphlen > sizeof(struct ip)) {
85 ip_stripoptions(m, (struct mbuf *)0);
86 iphlen = sizeof(struct ip);
87 }
88
89 /*
90 * Get IP and UDP header together in first mbuf.
91 */
92 ip = mtod(m, struct ip *);
93 uh = (struct udphdr *)((caddr_t)ip + iphlen);
94
95 /*
96 * Make mbuf data length reflect UDP length.
97 * If not enough data to reflect UDP length, drop.
98 */
Stefan Weilb6dce922010-07-22 22:15:23 +020099 len = ntohs((uint16_t)uh->uh_ulen);
bellardf0cbd3e2004-04-22 00:10:48 +0000100
101 if (ip->ip_len != len) {
102 if (len > ip->ip_len) {
bellardf0cbd3e2004-04-22 00:10:48 +0000103 goto bad;
104 }
105 m_adj(m, len - ip->ip_len);
106 ip->ip_len = len;
107 }
ths5fafdf22007-09-16 21:08:06 +0000108
bellardf0cbd3e2004-04-22 00:10:48 +0000109 /*
110 * Save a copy of the IP header in case we want restore it
111 * for sending an ICMP error message in response.
112 */
ths5fafdf22007-09-16 21:08:06 +0000113 save_ip = *ip;
bellardf0cbd3e2004-04-22 00:10:48 +0000114 save_ip.ip_len+= iphlen; /* tcp_input subtracts this */
115
116 /*
117 * Checksum extended UDP header and data.
118 */
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200119 if (uh->uh_sum) {
blueswir1429d0a32009-01-13 19:48:42 +0000120 memset(&((struct ipovly *)ip)->ih_mbuf, 0, sizeof(struct mbuf_ptr));
bellardf0cbd3e2004-04-22 00:10:48 +0000121 ((struct ipovly *)ip)->ih_x1 = 0;
122 ((struct ipovly *)ip)->ih_len = uh->uh_ulen;
bellardf0cbd3e2004-04-22 00:10:48 +0000123 if(cksum(m, len + sizeof(struct ip))) {
bellardf0cbd3e2004-04-22 00:10:48 +0000124 goto bad;
125 }
126 }
127
128 /*
129 * handle DHCP/BOOTP
130 */
Jan Kiszka5a823622011-07-20 12:20:15 +0200131 if (ntohs(uh->uh_dport) == BOOTP_SERVER &&
132 (ip->ip_dst.s_addr == slirp->vhost_addr.s_addr ||
133 ip->ip_dst.s_addr == 0xffffffff)) {
134 bootp_input(m);
135 goto bad;
136 }
bellardf0cbd3e2004-04-22 00:10:48 +0000137
bellardc7f74642004-08-24 21:57:12 +0000138 /*
139 * handle TFTP
140 */
Jan Kiszka5a823622011-07-20 12:20:15 +0200141 if (ntohs(uh->uh_dport) == TFTP_SERVER &&
142 ip->ip_dst.s_addr == slirp->vhost_addr.s_addr) {
bellardc7f74642004-08-24 21:57:12 +0000143 tftp_input(m);
144 goto bad;
145 }
146
Jan Kiszka12b513d2011-07-20 12:20:13 +0200147 if (slirp->restricted) {
148 goto bad;
149 }
150
bellardf0cbd3e2004-04-22 00:10:48 +0000151 /*
152 * Locate pcb for datagram.
153 */
Jan Kiszka460fec62009-06-24 14:42:31 +0200154 so = slirp->udp_last_so;
Petr Matousek01f7cec2014-09-18 08:35:37 +0200155 if (so == &slirp->udb || so->so_lport != uh->uh_sport ||
bellardf0cbd3e2004-04-22 00:10:48 +0000156 so->so_laddr.s_addr != ip->ip_src.s_addr) {
157 struct socket *tmp;
ths3b46e622007-09-17 08:09:54 +0000158
Jan Kiszka460fec62009-06-24 14:42:31 +0200159 for (tmp = slirp->udb.so_next; tmp != &slirp->udb;
160 tmp = tmp->so_next) {
bellardf0cbd3e2004-04-22 00:10:48 +0000161 if (tmp->so_lport == uh->uh_sport &&
162 tmp->so_laddr.s_addr == ip->ip_src.s_addr) {
bellardf0cbd3e2004-04-22 00:10:48 +0000163 so = tmp;
164 break;
165 }
166 }
Jan Kiszka460fec62009-06-24 14:42:31 +0200167 if (tmp == &slirp->udb) {
bellardf0cbd3e2004-04-22 00:10:48 +0000168 so = NULL;
169 } else {
Jan Kiszka460fec62009-06-24 14:42:31 +0200170 slirp->udp_last_so = so;
bellardf0cbd3e2004-04-22 00:10:48 +0000171 }
172 }
ths5fafdf22007-09-16 21:08:06 +0000173
bellardf0cbd3e2004-04-22 00:10:48 +0000174 if (so == NULL) {
175 /*
176 * If there's no socket for this packet,
177 * create one
178 */
Jan Kiszka460fec62009-06-24 14:42:31 +0200179 so = socreate(slirp);
180 if (!so) {
181 goto bad;
182 }
bellardf0cbd3e2004-04-22 00:10:48 +0000183 if(udp_attach(so) == -1) {
ths5fafdf22007-09-16 21:08:06 +0000184 DEBUG_MISC((dfd," udp_attach errno = %d-%s\n",
bellardf0cbd3e2004-04-22 00:10:48 +0000185 errno,strerror(errno)));
186 sofree(so);
187 goto bad;
188 }
ths3b46e622007-09-17 08:09:54 +0000189
bellardf0cbd3e2004-04-22 00:10:48 +0000190 /*
191 * Setup fields
192 */
bellardf0cbd3e2004-04-22 00:10:48 +0000193 so->so_laddr = ip->ip_src;
194 so->so_lport = uh->uh_sport;
ths3b46e622007-09-17 08:09:54 +0000195
bellardf0cbd3e2004-04-22 00:10:48 +0000196 if ((so->so_iptos = udp_tos(so)) == 0)
197 so->so_iptos = ip->ip_tos;
ths3b46e622007-09-17 08:09:54 +0000198
bellardf0cbd3e2004-04-22 00:10:48 +0000199 /*
200 * XXXXX Here, check if it's in udpexec_list,
201 * and if it is, do the fork_exec() etc.
202 */
203 }
204
ths54fd9cd2007-01-17 22:47:40 +0000205 so->so_faddr = ip->ip_dst; /* XXX */
206 so->so_fport = uh->uh_dport; /* XXX */
207
bellardf0cbd3e2004-04-22 00:10:48 +0000208 iphlen += sizeof(struct udphdr);
209 m->m_len -= iphlen;
210 m->m_data += iphlen;
211
212 /*
213 * Now we sendto() the packet.
214 */
bellardf0cbd3e2004-04-22 00:10:48 +0000215 if(sosendto(so,m) == -1) {
216 m->m_len += iphlen;
217 m->m_data -= iphlen;
218 *ip=save_ip;
219 DEBUG_MISC((dfd,"udp tx errno = %d-%s\n",errno,strerror(errno)));
ths3b46e622007-09-17 08:09:54 +0000220 icmp_error(m, ICMP_UNREACH,ICMP_UNREACH_NET, 0,strerror(errno));
bellardf0cbd3e2004-04-22 00:10:48 +0000221 }
222
223 m_free(so->so_m); /* used for ICMP if error on sorecvfrom */
224
225 /* restore the orig mbuf packet */
226 m->m_len += iphlen;
227 m->m_data -= iphlen;
228 *ip=save_ip;
229 so->so_m=m; /* ICMP backup */
230
231 return;
232bad:
Jan Kiszka3acccfc2011-07-20 12:20:16 +0200233 m_free(m);
bellardf0cbd3e2004-04-22 00:10:48 +0000234}
235
ths5fafdf22007-09-16 21:08:06 +0000236int udp_output2(struct socket *so, struct mbuf *m,
bellardf0cbd3e2004-04-22 00:10:48 +0000237 struct sockaddr_in *saddr, struct sockaddr_in *daddr,
238 int iptos)
239{
240 register struct udpiphdr *ui;
241 int error = 0;
242
243 DEBUG_CALL("udp_output");
244 DEBUG_ARG("so = %lx", (long)so);
245 DEBUG_ARG("m = %lx", (long)m);
246 DEBUG_ARG("saddr = %lx", (long)saddr->sin_addr.s_addr);
247 DEBUG_ARG("daddr = %lx", (long)daddr->sin_addr.s_addr);
248
249 /*
250 * Adjust for header
251 */
252 m->m_data -= sizeof(struct udpiphdr);
253 m->m_len += sizeof(struct udpiphdr);
ths5fafdf22007-09-16 21:08:06 +0000254
bellardf0cbd3e2004-04-22 00:10:48 +0000255 /*
256 * Fill in mbuf with extended UDP header
257 * and addresses and length put into network format.
258 */
259 ui = mtod(m, struct udpiphdr *);
blueswir1429d0a32009-01-13 19:48:42 +0000260 memset(&ui->ui_i.ih_mbuf, 0 , sizeof(struct mbuf_ptr));
bellardf0cbd3e2004-04-22 00:10:48 +0000261 ui->ui_x1 = 0;
262 ui->ui_pr = IPPROTO_UDP;
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200263 ui->ui_len = htons(m->m_len - sizeof(struct ip));
bellardf0cbd3e2004-04-22 00:10:48 +0000264 /* XXXXX Check for from-one-location sockets, or from-any-location sockets */
265 ui->ui_src = saddr->sin_addr;
266 ui->ui_dst = daddr->sin_addr;
267 ui->ui_sport = saddr->sin_port;
268 ui->ui_dport = daddr->sin_port;
269 ui->ui_ulen = ui->ui_len;
270
271 /*
272 * Stuff checksum and output datagram.
273 */
274 ui->ui_sum = 0;
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200275 if ((ui->ui_sum = cksum(m, m->m_len)) == 0)
bellardf0cbd3e2004-04-22 00:10:48 +0000276 ui->ui_sum = 0xffff;
bellardf0cbd3e2004-04-22 00:10:48 +0000277 ((struct ip *)ui)->ip_len = m->m_len;
278
blueswir19634d902007-10-26 19:01:16 +0000279 ((struct ip *)ui)->ip_ttl = IPDEFTTL;
bellardf0cbd3e2004-04-22 00:10:48 +0000280 ((struct ip *)ui)->ip_tos = iptos;
ths5fafdf22007-09-16 21:08:06 +0000281
bellardf0cbd3e2004-04-22 00:10:48 +0000282 error = ip_output(so, m);
ths5fafdf22007-09-16 21:08:06 +0000283
bellardf0cbd3e2004-04-22 00:10:48 +0000284 return (error);
285}
286
ths5fafdf22007-09-16 21:08:06 +0000287int udp_output(struct socket *so, struct mbuf *m,
bellardf0cbd3e2004-04-22 00:10:48 +0000288 struct sockaddr_in *addr)
289
290{
Jan Kiszka460fec62009-06-24 14:42:31 +0200291 Slirp *slirp = so->slirp;
bellardf0cbd3e2004-04-22 00:10:48 +0000292 struct sockaddr_in saddr, daddr;
293
294 saddr = *addr;
Jan Kiszka460fec62009-06-24 14:42:31 +0200295 if ((so->so_faddr.s_addr & slirp->vnetwork_mask.s_addr) ==
296 slirp->vnetwork_addr.s_addr) {
297 uint32_t inv_mask = ~slirp->vnetwork_mask.s_addr;
298
299 if ((so->so_faddr.s_addr & inv_mask) == inv_mask) {
300 saddr.sin_addr = slirp->vhost_addr;
Jan Kiszkaa13a4122009-06-24 14:42:28 +0200301 } else if (addr->sin_addr.s_addr == loopback_addr.s_addr ||
Jan Kiszka460fec62009-06-24 14:42:31 +0200302 so->so_faddr.s_addr != slirp->vhost_addr.s_addr) {
Jan Kiszkaa13a4122009-06-24 14:42:28 +0200303 saddr.sin_addr = so->so_faddr;
304 }
bellardc904d612006-05-03 20:53:46 +0000305 }
bellardf0cbd3e2004-04-22 00:10:48 +0000306 daddr.sin_addr = so->so_laddr;
307 daddr.sin_port = so->so_lport;
ths3b46e622007-09-17 08:09:54 +0000308
bellardf0cbd3e2004-04-22 00:10:48 +0000309 return udp_output2(so, m, &saddr, &daddr, so->so_iptos);
310}
311
312int
blueswir1aeed97c2009-04-18 07:32:41 +0000313udp_attach(struct socket *so)
bellardf0cbd3e2004-04-22 00:10:48 +0000314{
Kevin Wolf40ff6d72009-12-02 12:24:42 +0100315 if((so->s = qemu_socket(AF_INET,SOCK_DGRAM,0)) != -1) {
Ed Swierk97df1ee2009-07-22 17:53:15 -0700316 so->so_expire = curtime + SO_EXPIRE;
317 insque(so, &so->slirp->udb);
bellardf0cbd3e2004-04-22 00:10:48 +0000318 }
319 return(so->s);
320}
321
322void
blueswir1aeed97c2009-04-18 07:32:41 +0000323udp_detach(struct socket *so)
bellardf0cbd3e2004-04-22 00:10:48 +0000324{
bellard379ff532004-07-12 22:33:07 +0000325 closesocket(so->s);
bellardf0cbd3e2004-04-22 00:10:48 +0000326 sofree(so);
327}
328
blueswir19634d902007-10-26 19:01:16 +0000329static const struct tos_t udptos[] = {
bellardf0cbd3e2004-04-22 00:10:48 +0000330 {0, 53, IPTOS_LOWDELAY, 0}, /* DNS */
bellardf0cbd3e2004-04-22 00:10:48 +0000331 {0, 0, 0, 0}
332};
333
Stefan Weilb6dce922010-07-22 22:15:23 +0200334static uint8_t
blueswir19634d902007-10-26 19:01:16 +0000335udp_tos(struct socket *so)
bellardf0cbd3e2004-04-22 00:10:48 +0000336{
337 int i = 0;
ths5fafdf22007-09-16 21:08:06 +0000338
bellardf0cbd3e2004-04-22 00:10:48 +0000339 while(udptos[i].tos) {
340 if ((udptos[i].fport && ntohs(so->so_fport) == udptos[i].fport) ||
341 (udptos[i].lport && ntohs(so->so_lport) == udptos[i].lport)) {
342 so->so_emu = udptos[i].emu;
343 return udptos[i].tos;
344 }
345 i++;
346 }
ths5fafdf22007-09-16 21:08:06 +0000347
bellardf0cbd3e2004-04-22 00:10:48 +0000348 return 0;
349}
350
bellardf0cbd3e2004-04-22 00:10:48 +0000351struct socket *
Stefan Weilb6dce922010-07-22 22:15:23 +0200352udp_listen(Slirp *slirp, uint32_t haddr, u_int hport, uint32_t laddr,
Jan Kiszka460fec62009-06-24 14:42:31 +0200353 u_int lport, int flags)
bellardf0cbd3e2004-04-22 00:10:48 +0000354{
355 struct sockaddr_in addr;
356 struct socket *so;
Sebastian Ottlikaad12392013-10-02 12:23:15 +0200357 socklen_t addrlen = sizeof(struct sockaddr_in);
ths5fafdf22007-09-16 21:08:06 +0000358
Jan Kiszka460fec62009-06-24 14:42:31 +0200359 so = socreate(slirp);
360 if (!so) {
361 return NULL;
bellardf0cbd3e2004-04-22 00:10:48 +0000362 }
Kevin Wolf40ff6d72009-12-02 12:24:42 +0100363 so->s = qemu_socket(AF_INET,SOCK_DGRAM,0);
bellardf0cbd3e2004-04-22 00:10:48 +0000364 so->so_expire = curtime + SO_EXPIRE;
Jan Kiszka460fec62009-06-24 14:42:31 +0200365 insque(so, &slirp->udb);
bellardf0cbd3e2004-04-22 00:10:48 +0000366
367 addr.sin_family = AF_INET;
Jan Kiszka3c6a0582009-06-24 14:42:28 +0200368 addr.sin_addr.s_addr = haddr;
369 addr.sin_port = hport;
bellardf0cbd3e2004-04-22 00:10:48 +0000370
371 if (bind(so->s,(struct sockaddr *)&addr, addrlen) < 0) {
372 udp_detach(so);
373 return NULL;
374 }
Sebastian Ottlikaad12392013-10-02 12:23:15 +0200375 socket_set_fast_reuse(so->s);
ths5fafdf22007-09-16 21:08:06 +0000376
bellardf0cbd3e2004-04-22 00:10:48 +0000377 getsockname(so->s,(struct sockaddr *)&addr,&addrlen);
378 so->so_fport = addr.sin_port;
Jan Kiszkaa13a4122009-06-24 14:42:28 +0200379 if (addr.sin_addr.s_addr == 0 ||
380 addr.sin_addr.s_addr == loopback_addr.s_addr) {
Jan Kiszka460fec62009-06-24 14:42:31 +0200381 so->so_faddr = slirp->vhost_addr;
Jan Kiszkaa13a4122009-06-24 14:42:28 +0200382 } else {
bellardf0cbd3e2004-04-22 00:10:48 +0000383 so->so_faddr = addr.sin_addr;
Jan Kiszkaa13a4122009-06-24 14:42:28 +0200384 }
bellardf0cbd3e2004-04-22 00:10:48 +0000385 so->so_lport = lport;
386 so->so_laddr.s_addr = laddr;
387 if (flags != SS_FACCEPTONCE)
388 so->so_expire = 0;
ths5fafdf22007-09-16 21:08:06 +0000389
Jan Kiszkaf932b6c2009-06-24 14:42:29 +0200390 so->so_state &= SS_PERSISTENT_MASK;
Jan Kiszka6dd5ffb2009-06-24 14:42:29 +0200391 so->so_state |= SS_ISFCONNECTED | flags;
ths5fafdf22007-09-16 21:08:06 +0000392
bellardf0cbd3e2004-04-22 00:10:48 +0000393 return so;
394}