blob: 227d779022521bd3a170d41f0bcf65000435aeae [file] [log] [blame]
bellardf0cbd3e2004-04-22 00:10:48 +00001/*
2 * Copyright (c) 1982, 1986, 1988, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
aliguori2f5f8992009-01-26 19:37:41 +000013 * 3. Neither the name of the University nor the names of its contributors
bellardf0cbd3e2004-04-22 00:10:48 +000014 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 * @(#)udp_usrreq.c 8.4 (Berkeley) 1/21/94
30 * udp_usrreq.c,v 1.4 1994/10/02 17:48:45 phk Exp
31 */
32
33/*
34 * Changes and additions relating to SLiRP
35 * Copyright (c) 1995 Danny Gasparovski.
ths5fafdf22007-09-16 21:08:06 +000036 *
37 * Please read the file COPYRIGHT for the
bellardf0cbd3e2004-04-22 00:10:48 +000038 * terms and conditions of the copyright.
39 */
40
Peter Maydell7df74822016-01-29 17:49:59 +000041#include "qemu/osdep.h"
Markus Armbrustera9c94272016-06-22 19:11:19 +020042#include "slirp.h"
bellardf0cbd3e2004-04-22 00:10:48 +000043#include "ip_icmp.h"
44
Stefan Weilb6dce922010-07-22 22:15:23 +020045static uint8_t udp_tos(struct socket *so);
blueswir19634d902007-10-26 19:01:16 +000046
bellardf0cbd3e2004-04-22 00:10:48 +000047void
Jan Kiszka460fec62009-06-24 14:42:31 +020048udp_init(Slirp *slirp)
bellardf0cbd3e2004-04-22 00:10:48 +000049{
Jan Kiszka460fec62009-06-24 14:42:31 +020050 slirp->udb.so_next = slirp->udb.so_prev = &slirp->udb;
51 slirp->udp_last_so = &slirp->udb;
bellardf0cbd3e2004-04-22 00:10:48 +000052}
Jan Kiszkaa68adc22012-02-29 19:14:23 +010053
54void udp_cleanup(Slirp *slirp)
55{
56 while (slirp->udb.so_next != &slirp->udb) {
57 udp_detach(slirp->udb.so_next);
58 }
59}
60
ths5fafdf22007-09-16 21:08:06 +000061/* m->m_data points at ip packet header
62 * m->m_len length ip packet
bellardf0cbd3e2004-04-22 00:10:48 +000063 * ip->ip_len length data (IPDU)
64 */
65void
blueswir1aeed97c2009-04-18 07:32:41 +000066udp_input(register struct mbuf *m, int iphlen)
bellardf0cbd3e2004-04-22 00:10:48 +000067{
Jan Kiszka460fec62009-06-24 14:42:31 +020068 Slirp *slirp = m->slirp;
bellardf0cbd3e2004-04-22 00:10:48 +000069 register struct ip *ip;
70 register struct udphdr *uh;
bellardf0cbd3e2004-04-22 00:10:48 +000071 int len;
ths5fafdf22007-09-16 21:08:06 +000072 struct ip save_ip;
bellardf0cbd3e2004-04-22 00:10:48 +000073 struct socket *so;
Guillaume Subiron8a87f122015-12-19 22:25:01 +010074 struct sockaddr_storage lhost;
75 struct sockaddr_in *lhost4;
ths5fafdf22007-09-16 21:08:06 +000076
bellardf0cbd3e2004-04-22 00:10:48 +000077 DEBUG_CALL("udp_input");
Stefan Weilecc804c2015-08-29 09:12:35 +020078 DEBUG_ARG("m = %p", m);
bellardf0cbd3e2004-04-22 00:10:48 +000079 DEBUG_ARG("iphlen = %d", iphlen);
ths5fafdf22007-09-16 21:08:06 +000080
bellardf0cbd3e2004-04-22 00:10:48 +000081 /*
82 * Strip IP options, if any; should skip this,
83 * make available to user, and use on returned packets,
84 * but we don't yet have a way to check the checksum
85 * with options still present.
86 */
87 if(iphlen > sizeof(struct ip)) {
88 ip_stripoptions(m, (struct mbuf *)0);
89 iphlen = sizeof(struct ip);
90 }
91
92 /*
93 * Get IP and UDP header together in first mbuf.
94 */
95 ip = mtod(m, struct ip *);
96 uh = (struct udphdr *)((caddr_t)ip + iphlen);
97
98 /*
99 * Make mbuf data length reflect UDP length.
100 * If not enough data to reflect UDP length, drop.
101 */
Stefan Weilb6dce922010-07-22 22:15:23 +0200102 len = ntohs((uint16_t)uh->uh_ulen);
bellardf0cbd3e2004-04-22 00:10:48 +0000103
104 if (ip->ip_len != len) {
105 if (len > ip->ip_len) {
bellardf0cbd3e2004-04-22 00:10:48 +0000106 goto bad;
107 }
108 m_adj(m, len - ip->ip_len);
109 ip->ip_len = len;
110 }
ths5fafdf22007-09-16 21:08:06 +0000111
bellardf0cbd3e2004-04-22 00:10:48 +0000112 /*
113 * Save a copy of the IP header in case we want restore it
114 * for sending an ICMP error message in response.
115 */
ths5fafdf22007-09-16 21:08:06 +0000116 save_ip = *ip;
bellardf0cbd3e2004-04-22 00:10:48 +0000117 save_ip.ip_len+= iphlen; /* tcp_input subtracts this */
118
119 /*
120 * Checksum extended UDP header and data.
121 */
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200122 if (uh->uh_sum) {
blueswir1429d0a32009-01-13 19:48:42 +0000123 memset(&((struct ipovly *)ip)->ih_mbuf, 0, sizeof(struct mbuf_ptr));
bellardf0cbd3e2004-04-22 00:10:48 +0000124 ((struct ipovly *)ip)->ih_x1 = 0;
125 ((struct ipovly *)ip)->ih_len = uh->uh_ulen;
bellardf0cbd3e2004-04-22 00:10:48 +0000126 if(cksum(m, len + sizeof(struct ip))) {
bellardf0cbd3e2004-04-22 00:10:48 +0000127 goto bad;
128 }
129 }
130
Thomas Huthfad7fb92016-03-15 10:31:23 +0100131 lhost.ss_family = AF_INET;
132 lhost4 = (struct sockaddr_in *) &lhost;
133 lhost4->sin_addr = ip->ip_src;
134 lhost4->sin_port = uh->uh_sport;
135
bellardf0cbd3e2004-04-22 00:10:48 +0000136 /*
137 * handle DHCP/BOOTP
138 */
Jan Kiszka5a823622011-07-20 12:20:15 +0200139 if (ntohs(uh->uh_dport) == BOOTP_SERVER &&
140 (ip->ip_dst.s_addr == slirp->vhost_addr.s_addr ||
141 ip->ip_dst.s_addr == 0xffffffff)) {
142 bootp_input(m);
143 goto bad;
144 }
bellardf0cbd3e2004-04-22 00:10:48 +0000145
bellardc7f74642004-08-24 21:57:12 +0000146 /*
147 * handle TFTP
148 */
Jan Kiszka5a823622011-07-20 12:20:15 +0200149 if (ntohs(uh->uh_dport) == TFTP_SERVER &&
150 ip->ip_dst.s_addr == slirp->vhost_addr.s_addr) {
Thomas Huthfad7fb92016-03-15 10:31:23 +0100151 m->m_data += iphlen;
152 m->m_len -= iphlen;
153 tftp_input(&lhost, m);
154 m->m_data -= iphlen;
155 m->m_len += iphlen;
bellardc7f74642004-08-24 21:57:12 +0000156 goto bad;
157 }
158
Jan Kiszka12b513d2011-07-20 12:20:13 +0200159 if (slirp->restricted) {
160 goto bad;
161 }
162
bellardf0cbd3e2004-04-22 00:10:48 +0000163 /*
164 * Locate pcb for datagram.
165 */
Guillaume Subiron8a87f122015-12-19 22:25:01 +0100166 so = solookup(&slirp->udp_last_so, &slirp->udb, &lhost, NULL);
ths5fafdf22007-09-16 21:08:06 +0000167
bellardf0cbd3e2004-04-22 00:10:48 +0000168 if (so == NULL) {
169 /*
170 * If there's no socket for this packet,
171 * create one
172 */
Jan Kiszka460fec62009-06-24 14:42:31 +0200173 so = socreate(slirp);
174 if (!so) {
175 goto bad;
176 }
Guillaume Subiron9b5a30d2015-12-19 22:25:02 +0100177 if (udp_attach(so, AF_INET) == -1) {
ths5fafdf22007-09-16 21:08:06 +0000178 DEBUG_MISC((dfd," udp_attach errno = %d-%s\n",
bellardf0cbd3e2004-04-22 00:10:48 +0000179 errno,strerror(errno)));
180 sofree(so);
181 goto bad;
182 }
ths3b46e622007-09-17 08:09:54 +0000183
bellardf0cbd3e2004-04-22 00:10:48 +0000184 /*
185 * Setup fields
186 */
Guillaume Subironeae303f2015-12-19 22:24:58 +0100187 so->so_lfamily = AF_INET;
bellardf0cbd3e2004-04-22 00:10:48 +0000188 so->so_laddr = ip->ip_src;
189 so->so_lport = uh->uh_sport;
ths3b46e622007-09-17 08:09:54 +0000190
bellardf0cbd3e2004-04-22 00:10:48 +0000191 if ((so->so_iptos = udp_tos(so)) == 0)
192 so->so_iptos = ip->ip_tos;
ths3b46e622007-09-17 08:09:54 +0000193
bellardf0cbd3e2004-04-22 00:10:48 +0000194 /*
195 * XXXXX Here, check if it's in udpexec_list,
196 * and if it is, do the fork_exec() etc.
197 */
198 }
199
Guillaume Subironeae303f2015-12-19 22:24:58 +0100200 so->so_ffamily = AF_INET;
ths54fd9cd2007-01-17 22:47:40 +0000201 so->so_faddr = ip->ip_dst; /* XXX */
202 so->so_fport = uh->uh_dport; /* XXX */
203
bellardf0cbd3e2004-04-22 00:10:48 +0000204 iphlen += sizeof(struct udphdr);
205 m->m_len -= iphlen;
206 m->m_data += iphlen;
207
208 /*
209 * Now we sendto() the packet.
210 */
bellardf0cbd3e2004-04-22 00:10:48 +0000211 if(sosendto(so,m) == -1) {
212 m->m_len += iphlen;
213 m->m_data -= iphlen;
214 *ip=save_ip;
215 DEBUG_MISC((dfd,"udp tx errno = %d-%s\n",errno,strerror(errno)));
Yann Bordenavede40abf2016-03-15 10:31:19 +0100216 icmp_send_error(m, ICMP_UNREACH, ICMP_UNREACH_NET, 0,
217 strerror(errno));
Guillaume Subiron86c9e1e2015-12-19 22:24:55 +0100218 goto bad;
bellardf0cbd3e2004-04-22 00:10:48 +0000219 }
220
221 m_free(so->so_m); /* used for ICMP if error on sorecvfrom */
222
223 /* restore the orig mbuf packet */
224 m->m_len += iphlen;
225 m->m_data -= iphlen;
226 *ip=save_ip;
227 so->so_m=m; /* ICMP backup */
228
229 return;
230bad:
Jan Kiszka3acccfc2011-07-20 12:20:16 +0200231 m_free(m);
bellardf0cbd3e2004-04-22 00:10:48 +0000232}
233
Guillaume Subiron53792292015-12-19 22:24:59 +0100234int udp_output(struct socket *so, struct mbuf *m,
bellardf0cbd3e2004-04-22 00:10:48 +0000235 struct sockaddr_in *saddr, struct sockaddr_in *daddr,
236 int iptos)
237{
238 register struct udpiphdr *ui;
239 int error = 0;
240
241 DEBUG_CALL("udp_output");
Stefan Weilecc804c2015-08-29 09:12:35 +0200242 DEBUG_ARG("so = %p", so);
243 DEBUG_ARG("m = %p", m);
bellardf0cbd3e2004-04-22 00:10:48 +0000244 DEBUG_ARG("saddr = %lx", (long)saddr->sin_addr.s_addr);
245 DEBUG_ARG("daddr = %lx", (long)daddr->sin_addr.s_addr);
246
247 /*
248 * Adjust for header
249 */
250 m->m_data -= sizeof(struct udpiphdr);
251 m->m_len += sizeof(struct udpiphdr);
ths5fafdf22007-09-16 21:08:06 +0000252
bellardf0cbd3e2004-04-22 00:10:48 +0000253 /*
254 * Fill in mbuf with extended UDP header
255 * and addresses and length put into network format.
256 */
257 ui = mtod(m, struct udpiphdr *);
blueswir1429d0a32009-01-13 19:48:42 +0000258 memset(&ui->ui_i.ih_mbuf, 0 , sizeof(struct mbuf_ptr));
bellardf0cbd3e2004-04-22 00:10:48 +0000259 ui->ui_x1 = 0;
260 ui->ui_pr = IPPROTO_UDP;
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200261 ui->ui_len = htons(m->m_len - sizeof(struct ip));
bellardf0cbd3e2004-04-22 00:10:48 +0000262 /* XXXXX Check for from-one-location sockets, or from-any-location sockets */
263 ui->ui_src = saddr->sin_addr;
264 ui->ui_dst = daddr->sin_addr;
265 ui->ui_sport = saddr->sin_port;
266 ui->ui_dport = daddr->sin_port;
267 ui->ui_ulen = ui->ui_len;
268
269 /*
270 * Stuff checksum and output datagram.
271 */
272 ui->ui_sum = 0;
Jan Kiszka0d62c4c2009-06-24 14:42:29 +0200273 if ((ui->ui_sum = cksum(m, m->m_len)) == 0)
bellardf0cbd3e2004-04-22 00:10:48 +0000274 ui->ui_sum = 0xffff;
bellardf0cbd3e2004-04-22 00:10:48 +0000275 ((struct ip *)ui)->ip_len = m->m_len;
276
blueswir19634d902007-10-26 19:01:16 +0000277 ((struct ip *)ui)->ip_ttl = IPDEFTTL;
bellardf0cbd3e2004-04-22 00:10:48 +0000278 ((struct ip *)ui)->ip_tos = iptos;
ths5fafdf22007-09-16 21:08:06 +0000279
bellardf0cbd3e2004-04-22 00:10:48 +0000280 error = ip_output(so, m);
ths5fafdf22007-09-16 21:08:06 +0000281
bellardf0cbd3e2004-04-22 00:10:48 +0000282 return (error);
283}
284
bellardf0cbd3e2004-04-22 00:10:48 +0000285int
Guillaume Subiron9b5a30d2015-12-19 22:25:02 +0100286udp_attach(struct socket *so, unsigned short af)
bellardf0cbd3e2004-04-22 00:10:48 +0000287{
Guillaume Subiron9b5a30d2015-12-19 22:25:02 +0100288 so->s = qemu_socket(af, SOCK_DGRAM, 0);
289 if (so->s != -1) {
Ed Swierk97df1ee2009-07-22 17:53:15 -0700290 so->so_expire = curtime + SO_EXPIRE;
291 insque(so, &so->slirp->udb);
bellardf0cbd3e2004-04-22 00:10:48 +0000292 }
293 return(so->s);
294}
295
296void
blueswir1aeed97c2009-04-18 07:32:41 +0000297udp_detach(struct socket *so)
bellardf0cbd3e2004-04-22 00:10:48 +0000298{
bellard379ff532004-07-12 22:33:07 +0000299 closesocket(so->s);
bellardf0cbd3e2004-04-22 00:10:48 +0000300 sofree(so);
301}
302
blueswir19634d902007-10-26 19:01:16 +0000303static const struct tos_t udptos[] = {
bellardf0cbd3e2004-04-22 00:10:48 +0000304 {0, 53, IPTOS_LOWDELAY, 0}, /* DNS */
bellardf0cbd3e2004-04-22 00:10:48 +0000305 {0, 0, 0, 0}
306};
307
Stefan Weilb6dce922010-07-22 22:15:23 +0200308static uint8_t
blueswir19634d902007-10-26 19:01:16 +0000309udp_tos(struct socket *so)
bellardf0cbd3e2004-04-22 00:10:48 +0000310{
311 int i = 0;
ths5fafdf22007-09-16 21:08:06 +0000312
bellardf0cbd3e2004-04-22 00:10:48 +0000313 while(udptos[i].tos) {
314 if ((udptos[i].fport && ntohs(so->so_fport) == udptos[i].fport) ||
315 (udptos[i].lport && ntohs(so->so_lport) == udptos[i].lport)) {
316 so->so_emu = udptos[i].emu;
317 return udptos[i].tos;
318 }
319 i++;
320 }
ths5fafdf22007-09-16 21:08:06 +0000321
bellardf0cbd3e2004-04-22 00:10:48 +0000322 return 0;
323}
324
bellardf0cbd3e2004-04-22 00:10:48 +0000325struct socket *
Stefan Weilb6dce922010-07-22 22:15:23 +0200326udp_listen(Slirp *slirp, uint32_t haddr, u_int hport, uint32_t laddr,
Jan Kiszka460fec62009-06-24 14:42:31 +0200327 u_int lport, int flags)
bellardf0cbd3e2004-04-22 00:10:48 +0000328{
329 struct sockaddr_in addr;
330 struct socket *so;
Sebastian Ottlikaad12392013-10-02 12:23:15 +0200331 socklen_t addrlen = sizeof(struct sockaddr_in);
ths5fafdf22007-09-16 21:08:06 +0000332
Jan Kiszka460fec62009-06-24 14:42:31 +0200333 so = socreate(slirp);
334 if (!so) {
335 return NULL;
bellardf0cbd3e2004-04-22 00:10:48 +0000336 }
Kevin Wolf40ff6d72009-12-02 12:24:42 +0100337 so->s = qemu_socket(AF_INET,SOCK_DGRAM,0);
Peter Maydell4577b092017-02-04 23:08:33 +0000338 if (so->s < 0) {
339 sofree(so);
340 return NULL;
341 }
bellardf0cbd3e2004-04-22 00:10:48 +0000342 so->so_expire = curtime + SO_EXPIRE;
Jan Kiszka460fec62009-06-24 14:42:31 +0200343 insque(so, &slirp->udb);
bellardf0cbd3e2004-04-22 00:10:48 +0000344
345 addr.sin_family = AF_INET;
Jan Kiszka3c6a0582009-06-24 14:42:28 +0200346 addr.sin_addr.s_addr = haddr;
347 addr.sin_port = hport;
bellardf0cbd3e2004-04-22 00:10:48 +0000348
349 if (bind(so->s,(struct sockaddr *)&addr, addrlen) < 0) {
350 udp_detach(so);
351 return NULL;
352 }
Sebastian Ottlikaad12392013-10-02 12:23:15 +0200353 socket_set_fast_reuse(so->s);
ths5fafdf22007-09-16 21:08:06 +0000354
bellardf0cbd3e2004-04-22 00:10:48 +0000355 getsockname(so->s,(struct sockaddr *)&addr,&addrlen);
Guillaume Subiron53792292015-12-19 22:24:59 +0100356 so->fhost.sin = addr;
357 sotranslate_accept(so);
Guillaume Subironeae303f2015-12-19 22:24:58 +0100358 so->so_lfamily = AF_INET;
bellardf0cbd3e2004-04-22 00:10:48 +0000359 so->so_lport = lport;
360 so->so_laddr.s_addr = laddr;
361 if (flags != SS_FACCEPTONCE)
362 so->so_expire = 0;
ths5fafdf22007-09-16 21:08:06 +0000363
Jan Kiszkaf932b6c2009-06-24 14:42:29 +0200364 so->so_state &= SS_PERSISTENT_MASK;
Jan Kiszka6dd5ffb2009-06-24 14:42:29 +0200365 so->so_state |= SS_ISFCONNECTED | flags;
ths5fafdf22007-09-16 21:08:06 +0000366
bellardf0cbd3e2004-04-22 00:10:48 +0000367 return so;
368}