ddp_input.c revision 194619
1/*-
2 * Copyright (c) 2004-2009 Robert N. M. Watson
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 * Copyright (c) 1990, 1994 Regents of The University of Michigan.
27 *
28 * Permission to use, copy, modify, and distribute this software and
29 * its documentation for any purpose and without fee is hereby granted,
30 * provided that the above copyright notice appears in all copies and
31 * that both that copyright notice and this permission notice appear
32 * in supporting documentation, and that the name of The University
33 * of Michigan not be used in advertising or publicity pertaining to
34 * distribution of the software without specific, written prior
35 * permission. This software is supplied as is without expressed or
36 * implied warranties of any kind.
37 *
38 * This product includes software developed by the University of
39 * California, Berkeley and its contributors.
40 *
41 *	Research Systems Unix Group
42 *	The University of Michigan
43 *	c/o Wesley Craig
44 *	535 W. William Street
45 *	Ann Arbor, Michigan
46 *	+1-313-764-2278
47 *	netatalk@umich.edu
48 *
49 * $FreeBSD: head/sys/netatalk/ddp_input.c 194619 2009-06-22 10:23:54Z rwatson $
50 */
51
52#include <sys/param.h>
53#include <sys/kernel.h>
54#include <sys/lock.h>
55#include <sys/mbuf.h>
56#include <sys/signalvar.h>
57#include <sys/socket.h>
58#include <sys/socketvar.h>
59#include <sys/sx.h>
60#include <sys/systm.h>
61#include <net/if.h>
62#include <net/route.h>
63
64#include <netatalk/at.h>
65#include <netatalk/at_var.h>
66#include <netatalk/ddp.h>
67#include <netatalk/ddp_var.h>
68#include <netatalk/ddp_pcb.h>
69#include <netatalk/at_extern.h>
70
71#include <security/mac/mac_framework.h>
72
73static volatile int	ddp_forward = 1;
74static volatile int	ddp_firewall = 0;
75static struct ddpstat	ddpstat;
76
77static struct route	forwro;
78
79static void     ddp_input(struct mbuf *, struct ifnet *, struct elaphdr *, int);
80
81/*
82 * Could probably merge these two code segments a little better...
83 */
84void
85at2intr(struct mbuf *m)
86{
87
88	/*
89	 * Phase 2 packet handling .
90	 */
91	ddp_input(m, m->m_pkthdr.rcvif, NULL, 2);
92}
93
94void
95at1intr(struct mbuf *m)
96{
97	struct elaphdr *elhp, elh;
98
99	/*
100	 * Phase 1 packet handling
101	 */
102	if (m->m_len < SZ_ELAPHDR && ((m = m_pullup(m, SZ_ELAPHDR)) ==
103	    NULL)) {
104		ddpstat.ddps_tooshort++;
105		return;
106	}
107
108	/*
109	 * This seems a little dubious, but I don't know phase 1 so leave it.
110	 */
111	elhp = mtod(m, struct elaphdr *);
112	m_adj(m, SZ_ELAPHDR);
113
114	if (elhp->el_type != ELAP_DDPEXTEND) {
115		bcopy((caddr_t)elhp, (caddr_t)&elh, SZ_ELAPHDR);
116		ddp_input(m, m->m_pkthdr.rcvif, &elh, 1);
117	} else
118		ddp_input(m, m->m_pkthdr.rcvif, NULL, 1);
119}
120
121static void
122ddp_input(struct mbuf *m, struct ifnet *ifp, struct elaphdr *elh, int phase)
123{
124	struct sockaddr_at from, to;
125	struct ddpshdr *dsh, ddps;
126	struct at_ifaddr *aa;
127	struct ddpehdr *deh = NULL, ddpe;
128	struct ddpcb *ddp;
129	int dlen, mlen;
130	u_short cksum = 0;
131
132	bzero((caddr_t)&from, sizeof(struct sockaddr_at));
133	bzero((caddr_t)&to, sizeof(struct sockaddr_at));
134	if (elh != NULL) {
135		/*
136		 * Extract the information in the short header.  Network
137		 * information is defaulted to ATADDR_ANYNET and node
138		 * information comes from the elh info.  We must be phase 1.
139		 */
140		ddpstat.ddps_short++;
141
142		if (m->m_len < sizeof(struct ddpshdr) &&
143		    ((m = m_pullup(m, sizeof(struct ddpshdr))) == NULL)) {
144			ddpstat.ddps_tooshort++;
145			return;
146		}
147
148		dsh = mtod(m, struct ddpshdr *);
149		bcopy((caddr_t)dsh, (caddr_t)&ddps, sizeof(struct ddpshdr));
150		ddps.dsh_bytes = ntohl(ddps.dsh_bytes);
151		dlen = ddps.dsh_len;
152
153		to.sat_addr.s_net = ATADDR_ANYNET;
154		to.sat_addr.s_node = elh->el_dnode;
155		to.sat_port = ddps.dsh_dport;
156		from.sat_addr.s_net = ATADDR_ANYNET;
157		from.sat_addr.s_node = elh->el_snode;
158		from.sat_port = ddps.dsh_sport;
159
160		/*
161		 * Make sure that we point to the phase1 ifaddr info and that
162		 * it's valid for this packet.
163		 */
164		AT_IFADDR_RLOCK();
165		for (aa = at_ifaddr_list; aa != NULL; aa = aa->aa_next) {
166			if ((aa->aa_ifp == ifp)
167			    && ((aa->aa_flags & AFA_PHASE2) == 0)
168			    && ((to.sat_addr.s_node ==
169			    AA_SAT(aa)->sat_addr.s_node) ||
170			    (to.sat_addr.s_node == ATADDR_BCAST)))
171				break;
172		}
173		/*
174		 * maybe we got a broadcast not meant for us.. ditch it.
175		 */
176		if (aa == NULL) {
177			AT_IFADDR_RUNLOCK();
178			m_freem(m);
179			return;
180		}
181	} else {
182		/*
183		 * There was no 'elh' passed on. This could still be either
184		 * phase1 or phase2.  We have a long header, but we may be
185		 * running on a phase 1 net.  Extract out all the info
186		 * regarding this packet's src & dst.
187		 */
188		ddpstat.ddps_long++;
189
190		if (m->m_len < sizeof(struct ddpehdr) &&
191		    ((m = m_pullup(m, sizeof(struct ddpehdr))) == NULL)) {
192			AT_IFADDR_RUNLOCK();
193			ddpstat.ddps_tooshort++;
194			return;
195		}
196
197		deh = mtod(m, struct ddpehdr *);
198		bcopy((caddr_t)deh, (caddr_t)&ddpe, sizeof(struct ddpehdr));
199		ddpe.deh_bytes = ntohl(ddpe.deh_bytes);
200		dlen = ddpe.deh_len;
201
202		if ((cksum = ddpe.deh_sum) == 0)
203			ddpstat.ddps_nosum++;
204
205		from.sat_addr.s_net = ddpe.deh_snet;
206		from.sat_addr.s_node = ddpe.deh_snode;
207		from.sat_port = ddpe.deh_sport;
208		to.sat_addr.s_net = ddpe.deh_dnet;
209		to.sat_addr.s_node = ddpe.deh_dnode;
210		to.sat_port = ddpe.deh_dport;
211
212		AT_IFADDR_RLOCK();
213		if (to.sat_addr.s_net == ATADDR_ANYNET) {
214			/*
215			 * The TO address doesn't specify a net, so by
216			 * definition it's for this net.  Try find ifaddr
217			 * info with the right phase, the right interface,
218			 * and either to our node, a broadcast, or looped
219			 * back (though that SHOULD be covered in the other
220			 * cases).
221			 *
222			 * XXX If we have multiple interfaces, then the first
223			 * with this node number will match (which may NOT be
224			 * what we want, but it's probably safe in 99.999% of
225			 * cases.
226			 */
227			for (aa = at_ifaddr_list; aa != NULL;
228			    aa = aa->aa_next) {
229				if (phase == 1 && (aa->aa_flags &
230				    AFA_PHASE2))
231					continue;
232				if (phase == 2 && (aa->aa_flags &
233				    AFA_PHASE2) == 0)
234					continue;
235				if ((aa->aa_ifp == ifp) &&
236				    ((to.sat_addr.s_node ==
237				    AA_SAT(aa)->sat_addr.s_node) ||
238				    (to.sat_addr.s_node == ATADDR_BCAST) ||
239				    (ifp->if_flags & IFF_LOOPBACK)))
240					break;
241			}
242		} else {
243			/*
244			 * A destination network was given.  We just try to
245			 * find which ifaddr info matches it.
246	    		 */
247			for (aa = at_ifaddr_list; aa != NULL;
248			    aa = aa->aa_next) {
249				/*
250				 * This is a kludge. Accept packets that are
251				 * for any router on a local netrange.
252				 */
253				if (to.sat_addr.s_net == aa->aa_firstnet &&
254				    to.sat_addr.s_node == 0)
255					break;
256				/*
257				 * Don't use ifaddr info for which we are
258				 * totally outside the netrange, and it's not
259				 * a startup packet.  Startup packets are
260				 * always implicitly allowed on to the next
261				 * test.
262				 */
263				if (((ntohs(to.sat_addr.s_net) <
264				    ntohs(aa->aa_firstnet)) ||
265				    (ntohs(to.sat_addr.s_net) >
266				    ntohs(aa->aa_lastnet))) &&
267				    ((ntohs(to.sat_addr.s_net) < 0xff00) ||
268				    (ntohs(to.sat_addr.s_net) > 0xfffe)))
269					continue;
270
271				/*
272				 * Don't record a match either if we just
273				 * don't have a match in the node address.
274				 * This can have if the interface is in
275				 * promiscuous mode for example.
276				 */
277				if ((to.sat_addr.s_node !=
278				    AA_SAT(aa)->sat_addr.s_node) &&
279				    (to.sat_addr.s_node != ATADDR_BCAST))
280					continue;
281				break;
282			}
283		}
284	}
285	if (aa != NULL)
286		ifa_ref(&aa->aa_ifa);
287	AT_IFADDR_RUNLOCK();
288
289	/*
290	 * Adjust the length, removing any padding that may have been added
291	 * at a link layer.  We do this before we attempt to forward a
292	 * packet, possibly on a different media.
293	 */
294	mlen = m->m_pkthdr.len;
295	if (mlen < dlen) {
296		ddpstat.ddps_toosmall++;
297		goto out;
298	}
299	if (mlen > dlen)
300		m_adj(m, dlen - mlen);
301
302	/*
303	 * If it isn't for a net on any of our interfaces, or it IS for a net
304	 * on a different interface than it came in on, (and it is not looped
305	 * back) then consider if we should forward it.  As we are not really
306	 * a router this is a bit cheeky, but it may be useful some day.
307	 */
308	if ((aa == NULL) || ((to.sat_addr.s_node == ATADDR_BCAST) &&
309	    (aa->aa_ifp != ifp) && ((ifp->if_flags & IFF_LOOPBACK) == 0))) {
310		/*
311		 * If we've explicitly disabled it, don't route anything.
312		 */
313		if (ddp_forward == 0)
314			goto out;
315
316		/*
317		 * If the cached forwarding route is still valid, use it.
318		 *
319		 * XXXRW: Access to the cached route may not be properly
320		 * synchronized for parallel input handling.
321		 */
322		if (forwro.ro_rt &&
323		    (satosat(&forwro.ro_dst)->sat_addr.s_net !=
324		    to.sat_addr.s_net ||
325		    satosat(&forwro.ro_dst)->sat_addr.s_node !=
326		    to.sat_addr.s_node)) {
327			RTFREE(forwro.ro_rt);
328			forwro.ro_rt = NULL;
329		}
330
331		/*
332		 * If we don't have a cached one (any more) or it's useless,
333		 * then get a new route.
334		 *
335		 * XXX this could cause a 'route leak'.  Check this!
336		 */
337		if (forwro.ro_rt == NULL || forwro.ro_rt->rt_ifp == NULL) {
338			forwro.ro_dst.sa_len = sizeof(struct sockaddr_at);
339			forwro.ro_dst.sa_family = AF_APPLETALK;
340			satosat(&forwro.ro_dst)->sat_addr.s_net =
341			    to.sat_addr.s_net;
342			satosat(&forwro.ro_dst)->sat_addr.s_node =
343			    to.sat_addr.s_node;
344			rtalloc(&forwro);
345		}
346
347		/*
348		 * If it's not going to get there on this hop, and it's
349		 * already done too many hops, then throw it away.
350		 */
351		if ((to.sat_addr.s_net !=
352		    satosat(&forwro.ro_dst)->sat_addr.s_net) &&
353		    (ddpe.deh_hops == DDP_MAXHOPS))
354			goto out;
355
356		/*
357		 * A ddp router might use the same interface to forward the
358		 * packet, which this would not effect.  Don't allow packets
359		 * to cross from one interface to another however.
360		 */
361		if (ddp_firewall && ((forwro.ro_rt == NULL) ||
362		    (forwro.ro_rt->rt_ifp != ifp)))
363			goto out;
364
365		/*
366		 * Adjust the header.  If it was a short header then it would
367		 * have not gotten here, so we can assume there is room to
368		 * drop the header in.
369		 *
370		 * XXX what about promiscuous mode, etc...
371		 */
372		ddpe.deh_hops++;
373		ddpe.deh_bytes = htonl(ddpe.deh_bytes);
374		/* XXX deh? */
375		bcopy((caddr_t)&ddpe, (caddr_t)deh, sizeof(u_short));
376		if (ddp_route(m, &forwro))
377			ddpstat.ddps_cantforward++;
378		else
379			ddpstat.ddps_forward++;
380		if (aa != NULL)
381			ifa_free(&aa->aa_ifa);
382		return;
383	}
384
385	/*
386	 * It was for us, and we have an ifaddr to use with it.
387	 */
388	from.sat_len = sizeof(struct sockaddr_at);
389	from.sat_family = AF_APPLETALK;
390
391	/*
392	 * We are no longer interested in the link layer so cut it off.
393	 */
394	if (elh == NULL) {
395		if (ddp_cksum && cksum && cksum !=
396		    at_cksum(m, sizeof(int))) {
397			ddpstat.ddps_badsum++;
398			goto out;
399		}
400		m_adj(m, sizeof(struct ddpehdr));
401	} else
402		m_adj(m, sizeof(struct ddpshdr));
403
404	/*
405	 * Search for ddp protocol control blocks that match these addresses.
406	 */
407	DDP_LIST_SLOCK();
408	if ((ddp = ddp_search(&from, &to, aa)) == NULL)
409		goto out_unlock;
410
411#ifdef MAC
412	if (mac_socket_check_deliver(ddp->ddp_socket, m) != 0)
413		goto out_unlock;
414#endif
415
416	/*
417	 * If we found one, deliver the packet to the socket
418	 */
419	SOCKBUF_LOCK(&ddp->ddp_socket->so_rcv);
420	if (sbappendaddr_locked(&ddp->ddp_socket->so_rcv,
421	    (struct sockaddr *)&from, m, NULL) == 0) {
422    		SOCKBUF_UNLOCK(&ddp->ddp_socket->so_rcv);
423		/*
424		 * If the socket is full (or similar error) dump the packet.
425		 */
426		ddpstat.ddps_nosockspace++;
427		goto out_unlock;
428	}
429
430	/*
431	 * And wake up whatever might be waiting for it
432	 */
433	sorwakeup_locked(ddp->ddp_socket);
434	m = NULL;
435out_unlock:
436	DDP_LIST_SUNLOCK();
437out:
438	if (aa != NULL)
439		ifa_free(&aa->aa_ifa);
440	if (m != NULL)
441		m_freem(m);
442}
443