X-Git-Url: https://git.saurik.com/apple/xnu.git/blobdiff_plain/2d21ac55c334faf3a56e5634905ed6987fc787d4..c3c9b80d004dbbfdf763edeb97968c6997e3b45b:/bsd/netkey/keysock.c diff --git a/bsd/netkey/keysock.c b/bsd/netkey/keysock.c index 08f515e1c..038588c88 100644 --- a/bsd/netkey/keysock.c +++ b/bsd/netkey/keysock.c @@ -1,3 +1,31 @@ +/* + * Copyright (c) 2019 Apple Inc. All rights reserved. + * + * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ + * + * This file contains Original Code and/or Modifications of Original Code + * as defined in and that are subject to the Apple Public Source License + * Version 2.0 (the 'License'). You may not use this file except in + * compliance with the License. The rights granted to you under the License + * may not be used to create, or enable the creation or redistribution of, + * unlawful or unlicensed copies of an Apple operating system, or to + * circumvent, violate, or enable the circumvention or violation of, any + * terms of an Apple operating system software license agreement. + * + * Please obtain a copy of the License at + * http://www.opensource.apple.com/apsl/ and read it before using this file. + * + * The Original Code and all software distributed under the License are + * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER + * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, + * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, + * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. + * Please see the License for the specific language governing rights and + * limitations under the License. + * + * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ + */ + /* $KAME: keysock.c,v 1.13 2000/03/25 07:24:13 sumikawa Exp $ */ /* @@ -37,6 +65,7 @@ #include #include #include +#include #include #include #include @@ -56,15 +85,17 @@ #include extern lck_mtx_t *raw_mtx; -extern void key_init(void) __attribute__((section("__TEXT, initcode"))); +extern void key_init(struct protosw *, struct domain *); -struct sockaddr key_dst = { 2, PF_KEY, {0,0,0,0,0,0,0,0,0,0,0,0,0,0,} }; -struct sockaddr key_src = { 2, PF_KEY, {0,0,0,0,0,0,0,0,0,0,0,0,0,0,} }; +struct sockaddr key_dst = { .sa_len = 2, .sa_family = PF_KEY, .sa_data = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, } }; +struct sockaddr key_src = { .sa_len = 2, .sa_family = PF_KEY, .sa_data = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, } }; +static void key_dinit(struct domain *); static int key_sendup0(struct rawcb *, struct mbuf *, int); struct pfkeystat pfkeystat; +static struct domain *keydomain = NULL; extern lck_mtx_t *pfkey_stat_mutex; @@ -80,8 +111,8 @@ key_output(struct mbuf *m, struct socket *so) key_output(struct mbuf *m, ...) #else key_output(m, va_alist) - struct mbuf *m; - va_dcl +struct mbuf *m; +va_dcl #endif #endif { @@ -96,8 +127,9 @@ key_output(m, va_alist) va_end(ap); #endif - if (m == 0) + if (m == 0) { panic("key_output: NULL pointer was passed.\n"); + } socket_unlock(so, 0); lck_mtx_lock(pfkey_stat_mutex); @@ -126,8 +158,9 @@ key_output(m, va_alist) } } - if ((m->m_flags & M_PKTHDR) == 0) + if ((m->m_flags & M_PKTHDR) == 0) { panic("key_output: not M_PKTHDR ??"); + } #if IPSEC_DEBUG KEYDEBUG(KEYDEBUG_KEY_DUMP, kdebug_mbuf(m)); @@ -148,8 +181,9 @@ key_output(m, va_alist) m = NULL; end: - if (m) + if (m) { m_freem(m); + } socket_lock(so, 0); return error; } @@ -158,19 +192,17 @@ end: * send message to the socket. */ static int -key_sendup0(rp, m, promisc) - struct rawcb *rp; - struct mbuf *m; - int promisc; +key_sendup0(struct rawcb *rp, struct mbuf *m, int promisc) { int error; if (promisc) { struct sadb_msg *pmsg; - M_PREPEND(m, sizeof(struct sadb_msg), M_NOWAIT); - if (m && m->m_len < sizeof(struct sadb_msg)) + M_PREPEND(m, sizeof(struct sadb_msg), M_NOWAIT, 1); + if (m && m->m_len < sizeof(struct sadb_msg)) { m = m_pullup(m, sizeof(struct sadb_msg)); + } if (!m) { #if IPSEC_DEBUG printf("key_sendup0: cannot pullup\n"); @@ -180,12 +212,13 @@ key_sendup0(rp, m, promisc) return ENOBUFS; } m->m_pkthdr.len += sizeof(*pmsg); + VERIFY(PFKEY_UNIT64(m->m_pkthdr.len) <= UINT16_MAX); pmsg = mtod(m, struct sadb_msg *); bzero(pmsg, sizeof(*pmsg)); pmsg->sadb_msg_version = PF_KEY_V2; pmsg->sadb_msg_type = SADB_X_PROMISC; - pmsg->sadb_msg_len = PFKEY_UNIT64(m->m_pkthdr.len); + pmsg->sadb_msg_len = (u_int16_t)PFKEY_UNIT64(m->m_pkthdr.len); /* pid and seq? */ PFKEY_STAT_INCREMENT(pfkeystat.in_msgtype[pmsg->sadb_msg_type]); @@ -197,8 +230,7 @@ key_sendup0(rp, m, promisc) printf("key_sendup0: sbappendaddr failed\n"); #endif PFKEY_STAT_INCREMENT(pfkeystat.in_nomem); - } - else { + } else { sorwakeup(rp->rcb_socket); } return error; @@ -207,10 +239,7 @@ key_sendup0(rp, m, promisc) /* so can be NULL if target != KEY_SENDUP_ONE */ int -key_sendup_mbuf(so, m, target) - struct socket *so; - struct mbuf *m; - int target; +key_sendup_mbuf(struct socket *so, struct mbuf *m, int target) { struct mbuf *n; struct keycb *kp; @@ -218,10 +247,12 @@ key_sendup_mbuf(so, m, target) struct rawcb *rp; int error = 0; - if (m == NULL) + if (m == NULL) { panic("key_sendup_mbuf: NULL pointer was passed.\n"); - if (so == NULL && target == KEY_SENDUP_ONE) + } + if (so == NULL && target == KEY_SENDUP_ONE) { panic("key_sendup_mbuf: NULL pointer was passed.\n"); + } lck_mtx_lock(pfkey_stat_mutex); pfkeystat.in_total++; @@ -243,19 +274,20 @@ key_sendup_mbuf(so, m, target) msg = mtod(m, struct sadb_msg *); PFKEY_STAT_INCREMENT(pfkeystat.in_msgtype[msg->sadb_msg_type]); } - + lck_mtx_lock(raw_mtx); LIST_FOREACH(rp, &rawcb_list, list) { - if (rp->rcb_proto.sp_family != PF_KEY) + if (rp->rcb_proto.sp_family != PF_KEY) { continue; + } if (rp->rcb_proto.sp_protocol - && rp->rcb_proto.sp_protocol != PF_KEY_V2) { + && rp->rcb_proto.sp_protocol != PF_KEY_V2) { continue; } kp = (struct keycb *)rp; - + socket_lock(rp->rcb_socket, 1); /* * If you are in promiscuous mode, and when you get broadcasted @@ -284,8 +316,9 @@ key_sendup_mbuf(so, m, target) sendup++; break; case KEY_SENDUP_REGISTERED: - if (kp->kp_registered) + if (kp->kp_registered) { sendup++; + } break; } PFKEY_STAT_INCREMENT(pfkeystat.in_msgtarget[target]); @@ -293,10 +326,9 @@ key_sendup_mbuf(so, m, target) if (!sendup) { socket_unlock(rp->rcb_socket, 1); continue; - } - else + } else { sendup = 0; // clear for next iteration - + } if ((n = m_copy(m, 0, (int)M_COPYALL)) == NULL) { #if IPSEC_DEBUG printf("key_sendup: m_copy fail\n"); @@ -353,12 +385,14 @@ key_attach(struct socket *so, int proto, struct proc *p) struct keycb *kp; int error; - if (sotorawcb(so) != 0) - return EISCONN; /* XXX panic? */ - kp = (struct keycb *)_MALLOC(sizeof *kp, M_PCB, M_WAITOK); /* XXX */ - if (kp == 0) + if (sotorawcb(so) != 0) { + return EISCONN; /* XXX panic? */ + } + kp = (struct keycb *)_MALLOC(sizeof(*kp), M_PCB, + M_WAITOK | M_ZERO); /* XXX */ + if (kp == 0) { return ENOBUFS; - bzero(kp, sizeof *kp); + } so->so_pcb = (caddr_t)kp; kp->kp_promisc = kp->kp_registered = 0; @@ -376,8 +410,9 @@ key_attach(struct socket *so, int proto, struct proc *p) } /* so is already locked when calling key_attach */ - if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) /* XXX: AF_KEY */ + if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) { /* XXX: AF_KEY */ key_cb.key_count++; + } key_cb.any_count++; soisconnected(so); so->so_options |= SO_USELOOPBACK; @@ -420,8 +455,9 @@ key_detach(struct socket *so) int error; if (kp != 0) { - if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) /* XXX: AF_KEY */ + if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) { /* XXX: AF_KEY */ key_cb.key_count--; + } key_cb.any_count--; socket_unlock(so, 0); key_freereg(so); @@ -461,7 +497,7 @@ key_peeraddr(struct socket *so, struct sockaddr **nam) */ static int key_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, - struct mbuf *control, struct proc *p) + struct mbuf *control, struct proc *p) { int error; error = raw_usrreqs.pru_send(so, flags, m, nam, control, p); @@ -492,42 +528,63 @@ key_sockaddr(struct socket *so, struct sockaddr **nam) return error; } -struct pr_usrreqs key_usrreqs = { - key_abort, pru_accept_notsupp, key_attach, key_bind, - key_connect, - pru_connect2_notsupp, pru_control_notsupp, key_detach, - key_disconnect, pru_listen_notsupp, key_peeraddr, - pru_rcvd_notsupp, - pru_rcvoob_notsupp, key_send, pru_sense_null, key_shutdown, - key_sockaddr, sosend, soreceive, pru_sopoll_notsupp +static struct pr_usrreqs key_usrreqs = { + .pru_abort = key_abort, + .pru_attach = key_attach, + .pru_bind = key_bind, + .pru_connect = key_connect, + .pru_detach = key_detach, + .pru_disconnect = key_disconnect, + .pru_peeraddr = key_peeraddr, + .pru_send = key_send, + .pru_shutdown = key_shutdown, + .pru_sockaddr = key_sockaddr, + .pru_sosend = sosend, + .pru_soreceive = soreceive, }; /* sysctl */ -SYSCTL_NODE(_net, PF_KEY, key, CTLFLAG_RW|CTLFLAG_LOCKED, 0, "Key Family"); +SYSCTL_NODE(_net, PF_KEY, key, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "Key Family"); /* * Definitions of protocols supported in the KEY domain. */ -extern struct domain keydomain; - -struct protosw keysw[] = { -{ SOCK_RAW, &keydomain, PF_KEY_V2, PR_ATOMIC|PR_ADDR, - NULL, key_output, raw_ctlinput, NULL, - NULL, - key_init, NULL, NULL, NULL, - NULL, - &key_usrreqs, - NULL, NULL, NULL, - { NULL, NULL }, NULL, { 0 } -} +extern struct domain keydomain_s; + +static struct protosw keysw[] = { + { + .pr_type = SOCK_RAW, + .pr_protocol = PF_KEY_V2, + .pr_flags = PR_ATOMIC | PR_ADDR, + .pr_output = key_output, + .pr_ctlinput = raw_ctlinput, + .pr_init = key_init, + .pr_usrreqs = &key_usrreqs, + } }; -struct domain keydomain = { PF_KEY, "key", key_domain_init, NULL, NULL, - keysw, NULL, - NULL, 0, - sizeof(struct key_cb), 0, 0, - NULL, 0, { 0, 0} +static int key_proto_count = (sizeof(keysw) / sizeof(struct protosw)); + +struct domain keydomain_s = { + .dom_family = PF_KEY, + .dom_name = "key", + .dom_init = key_dinit, + .dom_maxrtkey = sizeof(struct key_cb), }; -DOMAIN_SET(key); +static void +key_dinit(struct domain *dp) +{ + struct protosw *pr; + int i; + + VERIFY(!(dp->dom_flags & DOM_INITIALIZED)); + VERIFY(keydomain == NULL); + + keydomain = dp; + + for (i = 0, pr = &keysw[0]; i < key_proto_count; i++, pr++) { + net_add_proto(pr, dp, 1); + } +}