1 1.10 pgoyette /* $NetBSD: accf_http.c,v 1.10 2020/03/16 21:20:11 pgoyette Exp $ */ 2 1.2 ad 3 1.1 tls /*- 4 1.1 tls * Copyright (c) 2000 Paycounter, Inc. 5 1.1 tls * Author: Alfred Perlstein <alfred (at) paycounter.com>, <alfred (at) FreeBSD.org> 6 1.1 tls * All rights reserved. 7 1.1 tls * 8 1.1 tls * Redistribution and use in source and binary forms, with or without 9 1.1 tls * modification, are permitted provided that the following conditions 10 1.1 tls * are met: 11 1.1 tls * 1. Redistributions of source code must retain the above copyright 12 1.1 tls * notice, this list of conditions and the following disclaimer. 13 1.1 tls * 2. Redistributions in binary form must reproduce the above copyright 14 1.1 tls * notice, this list of conditions and the following disclaimer in the 15 1.1 tls * documentation and/or other materials provided with the distribution. 16 1.1 tls * 17 1.1 tls * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 1.1 tls * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 1.1 tls * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 1.1 tls * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 1.1 tls * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 1.1 tls * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 1.1 tls * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 1.1 tls * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 1.1 tls * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 1.1 tls * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 1.1 tls * SUCH DAMAGE. 28 1.1 tls */ 29 1.1 tls 30 1.1 tls #include <sys/cdefs.h> 31 1.10 pgoyette __KERNEL_RCSID(0, "$NetBSD: accf_http.c,v 1.10 2020/03/16 21:20:11 pgoyette Exp $"); 32 1.1 tls 33 1.1 tls #define ACCEPT_FILTER_MOD 34 1.1 tls 35 1.1 tls #include <sys/param.h> 36 1.1 tls #include <sys/kernel.h> 37 1.1 tls #include <sys/mbuf.h> 38 1.3 ad #include <sys/module.h> 39 1.1 tls #include <sys/signalvar.h> 40 1.1 tls #include <sys/sysctl.h> 41 1.1 tls #include <sys/socket.h> 42 1.1 tls #include <sys/socketvar.h> 43 1.2 ad 44 1.1 tls #include <netinet/accept_filter.h> 45 1.1 tls 46 1.9 christos #include "ioconf.h" 47 1.9 christos 48 1.4 ad MODULE(MODULE_CLASS_MISC, accf_httpready, NULL); 49 1.3 ad 50 1.1 tls /* check for GET/HEAD */ 51 1.7 tls static void sohashttpget(struct socket *so, void *arg, int events, int waitflag); 52 1.1 tls /* check for HTTP/1.0 or HTTP/1.1 */ 53 1.7 tls static void soparsehttpvers(struct socket *so, void *arg, int events, int waitflag); 54 1.1 tls /* check for end of HTTP/1.x request */ 55 1.7 tls static void soishttpconnected(struct socket *so, void *arg, int events, int waitflag); 56 1.1 tls /* strcmp on an mbuf chain */ 57 1.1 tls static int mbufstrcmp(struct mbuf *m, struct mbuf *npkt, int offset, const char *cmp); 58 1.1 tls /* strncmp on an mbuf chain */ 59 1.1 tls static int mbufstrncmp(struct mbuf *m, struct mbuf *npkt, int offset, 60 1.1 tls int len, const char *cmp); 61 1.1 tls /* socketbuffer is full */ 62 1.1 tls static int sbfull(struct sockbuf *sb); 63 1.1 tls 64 1.1 tls static struct accept_filter accf_http_filter = { 65 1.2 ad .accf_name = "httpready", 66 1.2 ad .accf_callback = sohashttpget, 67 1.1 tls }; 68 1.1 tls 69 1.1 tls /* 70 1.1 tls * Names of HTTP Accept filter sysctl objects 71 1.1 tls */ 72 1.1 tls 73 1.1 tls #define ACCFCTL_PARSEVER 1 /* Parse HTTP version */ 74 1.1 tls 75 1.1 tls static int parse_http_version = 1; 76 1.1 tls 77 1.3 ad void 78 1.3 ad accf_httpattach(int junk) 79 1.3 ad { 80 1.3 ad 81 1.3 ad } 82 1.3 ad 83 1.10 pgoyette SYSCTL_SETUP(accf_sysctl_setup, "accf sysctl") 84 1.10 pgoyette { 85 1.10 pgoyette 86 1.10 pgoyette sysctl_createv(clog, 0, NULL, NULL, 87 1.10 pgoyette CTLFLAG_PERMANENT, 88 1.10 pgoyette CTLTYPE_NODE, "inet", NULL, 89 1.10 pgoyette NULL, 0, NULL, 0, 90 1.10 pgoyette CTL_NET, PF_INET, CTL_EOL); 91 1.10 pgoyette sysctl_createv(clog, 0, NULL, NULL, 92 1.10 pgoyette CTLFLAG_PERMANENT, 93 1.10 pgoyette CTLTYPE_NODE, "accf", NULL, 94 1.10 pgoyette NULL, 0, NULL, 0, 95 1.10 pgoyette CTL_NET, PF_INET, SO_ACCEPTFILTER, CTL_EOL); 96 1.10 pgoyette sysctl_createv(clog, 0, NULL, NULL, 97 1.10 pgoyette CTLFLAG_PERMANENT, 98 1.10 pgoyette CTLTYPE_NODE, "http", 99 1.10 pgoyette SYSCTL_DESCR("HTTP accept filter"), 100 1.10 pgoyette NULL, 0, NULL, 0, 101 1.10 pgoyette CTL_NET, PF_INET, SO_ACCEPTFILTER, ACCF_HTTP, CTL_EOL); 102 1.10 pgoyette sysctl_createv(clog, 0, NULL, NULL, 103 1.10 pgoyette CTLFLAG_PERMANENT|CTLFLAG_READWRITE, 104 1.10 pgoyette CTLTYPE_INT, "parsehttpversion", 105 1.10 pgoyette SYSCTL_DESCR("Parse http version so that non " 106 1.10 pgoyette "1.x requests work"), 107 1.10 pgoyette NULL, 0, &parse_http_version, 0, 108 1.10 pgoyette CTL_NET, PF_INET, SO_ACCEPTFILTER, ACCF_HTTP, 109 1.10 pgoyette ACCFCTL_PARSEVER, CTL_EOL); 110 1.10 pgoyette } 111 1.10 pgoyette 112 1.3 ad static int 113 1.5 ad accf_httpready_modcmd(modcmd_t cmd, void *arg) 114 1.1 tls { 115 1.3 ad int error; 116 1.3 ad 117 1.3 ad switch (cmd) { 118 1.3 ad case MODULE_CMD_INIT: 119 1.3 ad error = accept_filt_add(&accf_http_filter); 120 1.3 ad return 0; 121 1.1 tls 122 1.3 ad case MODULE_CMD_FINI: 123 1.3 ad error = accept_filt_del(&accf_http_filter); 124 1.10 pgoyette return error; 125 1.1 tls 126 1.3 ad default: 127 1.3 ad return ENOTTY; 128 1.3 ad } 129 1.1 tls } 130 1.1 tls 131 1.1 tls #ifdef ACCF_HTTP_DEBUG 132 1.1 tls #define DPRINT(fmt, args...) \ 133 1.1 tls do { \ 134 1.1 tls printf("%s:%d: " fmt "\n", __func__, __LINE__, ##args); \ 135 1.1 tls } while (0) 136 1.1 tls #else 137 1.1 tls #define DPRINT(fmt, args...) 138 1.1 tls #endif 139 1.1 tls 140 1.1 tls static int 141 1.1 tls sbfull(struct sockbuf *sb) 142 1.1 tls { 143 1.1 tls 144 1.1 tls DPRINT("sbfull, cc(%ld) >= hiwat(%ld): %d, " 145 1.1 tls "mbcnt(%ld) >= mbmax(%ld): %d", 146 1.1 tls sb->sb_cc, sb->sb_hiwat, sb->sb_cc >= sb->sb_hiwat, 147 1.1 tls sb->sb_mbcnt, sb->sb_mbmax, sb->sb_mbcnt >= sb->sb_mbmax); 148 1.1 tls return (sb->sb_cc >= sb->sb_hiwat || sb->sb_mbcnt >= sb->sb_mbmax); 149 1.1 tls } 150 1.1 tls 151 1.1 tls /* 152 1.1 tls * start at mbuf m, (must provide npkt if exists) 153 1.1 tls * starting at offset in m compare characters in mbuf chain for 'cmp' 154 1.1 tls */ 155 1.1 tls static int 156 1.1 tls mbufstrcmp(struct mbuf *m, struct mbuf *npkt, int offset, const char *cmp) 157 1.1 tls { 158 1.1 tls struct mbuf *n; 159 1.1 tls 160 1.1 tls for (; m != NULL; m = n) { 161 1.1 tls n = npkt; 162 1.1 tls if (npkt) 163 1.1 tls npkt = npkt->m_nextpkt; 164 1.1 tls for (; m; m = m->m_next) { 165 1.1 tls for (; offset < m->m_len; offset++, cmp++) { 166 1.1 tls if (*cmp == '\0') 167 1.1 tls return (1); 168 1.1 tls else if (*cmp != *(mtod(m, char *) + offset)) 169 1.1 tls return (0); 170 1.1 tls } 171 1.1 tls if (*cmp == '\0') 172 1.1 tls return (1); 173 1.1 tls offset = 0; 174 1.1 tls } 175 1.1 tls } 176 1.1 tls return (0); 177 1.1 tls } 178 1.1 tls 179 1.1 tls /* 180 1.1 tls * start at mbuf m, (must provide npkt if exists) 181 1.1 tls * starting at offset in m compare characters in mbuf chain for 'cmp' 182 1.1 tls * stop at 'max' characters 183 1.1 tls */ 184 1.1 tls static int 185 1.1 tls mbufstrncmp(struct mbuf *m, struct mbuf *npkt, int offset, int len, const char *cmp) 186 1.1 tls { 187 1.1 tls struct mbuf *n; 188 1.1 tls 189 1.1 tls for (; m != NULL; m = n) { 190 1.1 tls n = npkt; 191 1.1 tls if (npkt) 192 1.1 tls npkt = npkt->m_nextpkt; 193 1.1 tls for (; m; m = m->m_next) { 194 1.1 tls for (; offset < m->m_len; offset++, cmp++, len--) { 195 1.1 tls if (len == 0 || *cmp == '\0') 196 1.1 tls return (1); 197 1.1 tls else if (*cmp != *(mtod(m, char *) + offset)) 198 1.1 tls return (0); 199 1.1 tls } 200 1.1 tls if (len == 0 || *cmp == '\0') 201 1.1 tls return (1); 202 1.1 tls offset = 0; 203 1.1 tls } 204 1.1 tls } 205 1.1 tls return (0); 206 1.1 tls } 207 1.1 tls 208 1.1 tls #define STRSETUP(sptr, slen, str) \ 209 1.1 tls do { \ 210 1.1 tls sptr = str; \ 211 1.1 tls slen = sizeof(str) - 1; \ 212 1.1 tls } while(0) 213 1.1 tls 214 1.1 tls static void 215 1.7 tls sohashttpget(struct socket *so, void *arg, int events, int waitflag) 216 1.1 tls { 217 1.1 tls 218 1.1 tls if ((so->so_state & SS_CANTRCVMORE) == 0 && !sbfull(&so->so_rcv)) { 219 1.1 tls struct mbuf *m; 220 1.1 tls const char *cmp; 221 1.1 tls int cmplen, cc; 222 1.1 tls 223 1.1 tls m = so->so_rcv.sb_mb; 224 1.1 tls cc = so->so_rcv.sb_cc - 1; 225 1.1 tls if (cc < 1) 226 1.1 tls return; 227 1.1 tls switch (*mtod(m, char *)) { 228 1.1 tls case 'G': 229 1.1 tls STRSETUP(cmp, cmplen, "ET "); 230 1.1 tls break; 231 1.1 tls case 'H': 232 1.1 tls STRSETUP(cmp, cmplen, "EAD "); 233 1.1 tls break; 234 1.1 tls default: 235 1.1 tls goto fallout; 236 1.1 tls } 237 1.1 tls if (cc < cmplen) { 238 1.1 tls if (mbufstrncmp(m, m->m_nextpkt, 1, cc, cmp) == 1) { 239 1.1 tls DPRINT("short cc (%d) but mbufstrncmp ok", cc); 240 1.1 tls return; 241 1.1 tls } else { 242 1.1 tls DPRINT("short cc (%d) mbufstrncmp failed", cc); 243 1.1 tls goto fallout; 244 1.1 tls } 245 1.1 tls } 246 1.1 tls if (mbufstrcmp(m, m->m_nextpkt, 1, cmp) == 1) { 247 1.1 tls DPRINT("mbufstrcmp ok"); 248 1.1 tls if (parse_http_version == 0) 249 1.7 tls soishttpconnected(so, arg, events, waitflag); 250 1.1 tls else 251 1.7 tls soparsehttpvers(so, arg, events, waitflag); 252 1.1 tls return; 253 1.1 tls } 254 1.1 tls DPRINT("mbufstrcmp bad"); 255 1.1 tls } 256 1.1 tls 257 1.1 tls fallout: 258 1.1 tls DPRINT("fallout"); 259 1.1 tls so->so_upcall = NULL; 260 1.1 tls so->so_rcv.sb_flags &= ~SB_UPCALL; 261 1.1 tls soisconnected(so); 262 1.1 tls return; 263 1.1 tls } 264 1.1 tls 265 1.1 tls static void 266 1.7 tls soparsehttpvers(struct socket *so, void *arg, int events, int waitflag) 267 1.1 tls { 268 1.1 tls struct mbuf *m, *n; 269 1.1 tls int i, cc, spaces, inspaces; 270 1.1 tls 271 1.1 tls if ((so->so_state & SS_CANTRCVMORE) != 0 || sbfull(&so->so_rcv)) 272 1.1 tls goto fallout; 273 1.1 tls 274 1.1 tls m = so->so_rcv.sb_mb; 275 1.1 tls cc = so->so_rcv.sb_cc; 276 1.1 tls inspaces = spaces = 0; 277 1.1 tls for (m = so->so_rcv.sb_mb; m; m = n) { 278 1.1 tls n = m->m_nextpkt; 279 1.1 tls for (; m; m = m->m_next) { 280 1.1 tls for (i = 0; i < m->m_len; i++, cc--) { 281 1.1 tls switch (*(mtod(m, char *) + i)) { 282 1.1 tls case ' ': 283 1.1 tls /* tabs? '\t' */ 284 1.1 tls if (!inspaces) { 285 1.1 tls spaces++; 286 1.1 tls inspaces = 1; 287 1.1 tls } 288 1.1 tls break; 289 1.1 tls case '\r': 290 1.1 tls case '\n': 291 1.1 tls DPRINT("newline"); 292 1.1 tls goto fallout; 293 1.1 tls default: 294 1.1 tls if (spaces != 2) { 295 1.1 tls inspaces = 0; 296 1.1 tls break; 297 1.1 tls } 298 1.1 tls 299 1.1 tls /* 300 1.1 tls * if we don't have enough characters 301 1.1 tls * left (cc < sizeof("HTTP/1.0") - 1) 302 1.1 tls * then see if the remaining ones 303 1.1 tls * are a request we can parse. 304 1.1 tls */ 305 1.1 tls if (cc < sizeof("HTTP/1.0") - 1) { 306 1.1 tls if (mbufstrncmp(m, n, i, cc, 307 1.1 tls "HTTP/1.") == 1) { 308 1.1 tls DPRINT("ok"); 309 1.1 tls goto readmore; 310 1.1 tls } else { 311 1.1 tls DPRINT("bad"); 312 1.1 tls goto fallout; 313 1.1 tls } 314 1.1 tls } else if ( 315 1.1 tls mbufstrcmp(m, n, i, "HTTP/1.0") || 316 1.1 tls mbufstrcmp(m, n, i, "HTTP/1.1")) { 317 1.6 joerg DPRINT("ok"); 318 1.6 joerg soishttpconnected(so, 319 1.7 tls arg, events, waitflag); 320 1.6 joerg return; 321 1.1 tls } else { 322 1.1 tls DPRINT("bad"); 323 1.1 tls goto fallout; 324 1.1 tls } 325 1.1 tls } 326 1.1 tls } 327 1.1 tls } 328 1.1 tls } 329 1.1 tls readmore: 330 1.1 tls DPRINT("readmore"); 331 1.1 tls /* 332 1.1 tls * if we hit here we haven't hit something 333 1.1 tls * we don't understand or a newline, so try again 334 1.1 tls */ 335 1.1 tls so->so_upcall = soparsehttpvers; 336 1.1 tls so->so_rcv.sb_flags |= SB_UPCALL; 337 1.1 tls return; 338 1.1 tls 339 1.1 tls fallout: 340 1.1 tls DPRINT("fallout"); 341 1.1 tls so->so_upcall = NULL; 342 1.1 tls so->so_rcv.sb_flags &= ~SB_UPCALL; 343 1.1 tls soisconnected(so); 344 1.1 tls return; 345 1.1 tls } 346 1.1 tls 347 1.1 tls 348 1.1 tls #define NCHRS 3 349 1.1 tls 350 1.1 tls static void 351 1.7 tls soishttpconnected(struct socket *so, void *arg, int events, int waitflag) 352 1.1 tls { 353 1.1 tls char a, b, c; 354 1.1 tls struct mbuf *m, *n; 355 1.1 tls int ccleft, copied; 356 1.1 tls 357 1.1 tls DPRINT("start"); 358 1.1 tls if ((so->so_state & SS_CANTRCVMORE) != 0 || sbfull(&so->so_rcv)) 359 1.1 tls goto gotit; 360 1.1 tls 361 1.1 tls /* 362 1.1 tls * Walk the socketbuffer and copy the last NCHRS (3) into a, b, and c 363 1.1 tls * copied - how much we've copied so far 364 1.1 tls * ccleft - how many bytes remaining in the socketbuffer 365 1.1 tls * just loop over the mbufs subtracting from 'ccleft' until we only 366 1.1 tls * have NCHRS left 367 1.1 tls */ 368 1.1 tls copied = 0; 369 1.1 tls ccleft = so->so_rcv.sb_cc; 370 1.1 tls if (ccleft < NCHRS) 371 1.1 tls goto readmore; 372 1.1 tls a = b = c = '\0'; 373 1.1 tls for (m = so->so_rcv.sb_mb; m; m = n) { 374 1.1 tls n = m->m_nextpkt; 375 1.1 tls for (; m; m = m->m_next) { 376 1.1 tls ccleft -= m->m_len; 377 1.1 tls if (ccleft <= NCHRS) { 378 1.1 tls char *src; 379 1.1 tls int tocopy; 380 1.1 tls 381 1.1 tls tocopy = (NCHRS - ccleft) - copied; 382 1.1 tls src = mtod(m, char *) + (m->m_len - tocopy); 383 1.1 tls 384 1.1 tls while (tocopy--) { 385 1.1 tls switch (copied++) { 386 1.1 tls case 0: 387 1.1 tls a = *src++; 388 1.1 tls break; 389 1.1 tls case 1: 390 1.1 tls b = *src++; 391 1.1 tls break; 392 1.1 tls case 2: 393 1.1 tls c = *src++; 394 1.1 tls break; 395 1.1 tls } 396 1.1 tls } 397 1.1 tls } 398 1.1 tls } 399 1.1 tls } 400 1.1 tls if (c == '\n' && (b == '\n' || (b == '\r' && a == '\n'))) { 401 1.1 tls /* we have all request headers */ 402 1.1 tls goto gotit; 403 1.1 tls } 404 1.1 tls 405 1.1 tls readmore: 406 1.1 tls so->so_upcall = soishttpconnected; 407 1.1 tls so->so_rcv.sb_flags |= SB_UPCALL; 408 1.1 tls return; 409 1.1 tls 410 1.1 tls gotit: 411 1.1 tls so->so_upcall = NULL; 412 1.1 tls so->so_rcv.sb_flags &= ~SB_UPCALL; 413 1.1 tls soisconnected(so); 414 1.1 tls return; 415 1.1 tls } 416