Expand PMF_FN_* macros.
[netbsd-mini2440.git] / sys / netinet / accf_http.c
blob63607b428101e591964816a684e3f12fb5f8f2d7
1 /* $NetBSD: accf_http.c,v 1.6 2008/11/21 16:08:57 joerg Exp $ */
3 /*-
4 * Copyright (c) 2000 Paycounter, Inc.
5 * Author: Alfred Perlstein <alfred@paycounter.com>, <alfred@FreeBSD.org>
6 * All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
30 #include <sys/cdefs.h>
31 __KERNEL_RCSID(0, "$NetBSD: accf_http.c,v 1.6 2008/11/21 16:08:57 joerg Exp $");
33 #define ACCEPT_FILTER_MOD
35 #include <sys/param.h>
36 #include <sys/kernel.h>
37 #include <sys/mbuf.h>
38 #include <sys/module.h>
39 #include <sys/signalvar.h>
40 #include <sys/sysctl.h>
41 #include <sys/socket.h>
42 #include <sys/socketvar.h>
44 #include <netinet/accept_filter.h>
46 MODULE(MODULE_CLASS_MISC, accf_httpready, NULL);
48 /* check for GET/HEAD */
49 static void sohashttpget(struct socket *so, void *arg, int events, int waitflag);
50 /* check for HTTP/1.0 or HTTP/1.1 */
51 static void soparsehttpvers(struct socket *so, void *arg, int events, int waitflag);
52 /* check for end of HTTP/1.x request */
53 static void soishttpconnected(struct socket *so, void *arg, int events, int waitflag);
54 /* strcmp on an mbuf chain */
55 static int mbufstrcmp(struct mbuf *m, struct mbuf *npkt, int offset, const char *cmp);
56 /* strncmp on an mbuf chain */
57 static int mbufstrncmp(struct mbuf *m, struct mbuf *npkt, int offset,
58 int len, const char *cmp);
59 /* socketbuffer is full */
60 static int sbfull(struct sockbuf *sb);
62 static struct accept_filter accf_http_filter = {
63 .accf_name = "httpready",
64 .accf_callback = sohashttpget,
68 * Names of HTTP Accept filter sysctl objects
71 #define ACCFCTL_PARSEVER 1 /* Parse HTTP version */
73 static int parse_http_version = 1;
75 /* XXX pseudo-device */
76 void accf_httpattach(int);
78 void
79 accf_httpattach(int junk)
84 static int
85 accf_httpready_modcmd(modcmd_t cmd, void *arg)
87 static struct sysctllog *clog;
88 int error;
90 switch (cmd) {
91 case MODULE_CMD_INIT:
92 error = accept_filt_add(&accf_http_filter);
93 if (error != 0) {
94 return error;
96 sysctl_createv(&clog, 0, NULL, NULL,
97 CTLFLAG_PERMANENT,
98 CTLTYPE_NODE, "net", NULL,
99 NULL, 0, NULL, 0,
100 CTL_NET, CTL_EOL);
101 sysctl_createv(&clog, 0, NULL, NULL,
102 CTLFLAG_PERMANENT,
103 CTLTYPE_NODE, "inet", NULL,
104 NULL, 0, NULL, 0,
105 CTL_NET, PF_INET, CTL_EOL);
106 sysctl_createv(&clog, 0, NULL, NULL,
107 CTLFLAG_PERMANENT,
108 CTLTYPE_NODE, "accf", NULL,
109 NULL, 0, NULL, 0,
110 CTL_NET, PF_INET, SO_ACCEPTFILTER, CTL_EOL);
111 sysctl_createv(&clog, 0, NULL, NULL,
112 CTLFLAG_PERMANENT,
113 CTLTYPE_NODE, "http",
114 SYSCTL_DESCR("HTTP accept filter"),
115 NULL, 0, NULL, 0,
116 CTL_NET, PF_INET, SO_ACCEPTFILTER, ACCF_HTTP, CTL_EOL);
117 sysctl_createv(&clog, 0, NULL, NULL,
118 CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
119 CTLTYPE_INT, "parsehttpversion",
120 SYSCTL_DESCR("Parse http version so that non "
121 "1.x requests work"),
122 NULL, 0, &parse_http_version, 0,
123 CTL_NET, PF_INET, SO_ACCEPTFILTER, ACCF_HTTP,
124 ACCFCTL_PARSEVER, CTL_EOL);
125 return 0;
127 case MODULE_CMD_FINI:
128 error = accept_filt_del(&accf_http_filter);
129 if (error != 0) {
130 return error;
132 sysctl_teardown(&clog);
133 return 0;
135 default:
136 return ENOTTY;
140 #ifdef ACCF_HTTP_DEBUG
141 #define DPRINT(fmt, args...) \
142 do { \
143 printf("%s:%d: " fmt "\n", __func__, __LINE__, ##args); \
144 } while (0)
145 #else
146 #define DPRINT(fmt, args...)
147 #endif
149 static int
150 sbfull(struct sockbuf *sb)
153 DPRINT("sbfull, cc(%ld) >= hiwat(%ld): %d, "
154 "mbcnt(%ld) >= mbmax(%ld): %d",
155 sb->sb_cc, sb->sb_hiwat, sb->sb_cc >= sb->sb_hiwat,
156 sb->sb_mbcnt, sb->sb_mbmax, sb->sb_mbcnt >= sb->sb_mbmax);
157 return (sb->sb_cc >= sb->sb_hiwat || sb->sb_mbcnt >= sb->sb_mbmax);
161 * start at mbuf m, (must provide npkt if exists)
162 * starting at offset in m compare characters in mbuf chain for 'cmp'
164 static int
165 mbufstrcmp(struct mbuf *m, struct mbuf *npkt, int offset, const char *cmp)
167 struct mbuf *n;
169 for (; m != NULL; m = n) {
170 n = npkt;
171 if (npkt)
172 npkt = npkt->m_nextpkt;
173 for (; m; m = m->m_next) {
174 for (; offset < m->m_len; offset++, cmp++) {
175 if (*cmp == '\0')
176 return (1);
177 else if (*cmp != *(mtod(m, char *) + offset))
178 return (0);
180 if (*cmp == '\0')
181 return (1);
182 offset = 0;
185 return (0);
189 * start at mbuf m, (must provide npkt if exists)
190 * starting at offset in m compare characters in mbuf chain for 'cmp'
191 * stop at 'max' characters
193 static int
194 mbufstrncmp(struct mbuf *m, struct mbuf *npkt, int offset, int len, const char *cmp)
196 struct mbuf *n;
198 for (; m != NULL; m = n) {
199 n = npkt;
200 if (npkt)
201 npkt = npkt->m_nextpkt;
202 for (; m; m = m->m_next) {
203 for (; offset < m->m_len; offset++, cmp++, len--) {
204 if (len == 0 || *cmp == '\0')
205 return (1);
206 else if (*cmp != *(mtod(m, char *) + offset))
207 return (0);
209 if (len == 0 || *cmp == '\0')
210 return (1);
211 offset = 0;
214 return (0);
217 #define STRSETUP(sptr, slen, str) \
218 do { \
219 sptr = str; \
220 slen = sizeof(str) - 1; \
221 } while(0)
223 static void
224 sohashttpget(struct socket *so, void *arg, int events, int waitflag)
227 if ((so->so_state & SS_CANTRCVMORE) == 0 && !sbfull(&so->so_rcv)) {
228 struct mbuf *m;
229 const char *cmp;
230 int cmplen, cc;
232 m = so->so_rcv.sb_mb;
233 cc = so->so_rcv.sb_cc - 1;
234 if (cc < 1)
235 return;
236 switch (*mtod(m, char *)) {
237 case 'G':
238 STRSETUP(cmp, cmplen, "ET ");
239 break;
240 case 'H':
241 STRSETUP(cmp, cmplen, "EAD ");
242 break;
243 default:
244 goto fallout;
246 if (cc < cmplen) {
247 if (mbufstrncmp(m, m->m_nextpkt, 1, cc, cmp) == 1) {
248 DPRINT("short cc (%d) but mbufstrncmp ok", cc);
249 return;
250 } else {
251 DPRINT("short cc (%d) mbufstrncmp failed", cc);
252 goto fallout;
255 if (mbufstrcmp(m, m->m_nextpkt, 1, cmp) == 1) {
256 DPRINT("mbufstrcmp ok");
257 if (parse_http_version == 0)
258 soishttpconnected(so, arg, events, waitflag);
259 else
260 soparsehttpvers(so, arg, events, waitflag);
261 return;
263 DPRINT("mbufstrcmp bad");
266 fallout:
267 DPRINT("fallout");
268 so->so_upcall = NULL;
269 so->so_rcv.sb_flags &= ~SB_UPCALL;
270 soisconnected(so);
271 return;
274 static void
275 soparsehttpvers(struct socket *so, void *arg, int events, int waitflag)
277 struct mbuf *m, *n;
278 int i, cc, spaces, inspaces;
280 if ((so->so_state & SS_CANTRCVMORE) != 0 || sbfull(&so->so_rcv))
281 goto fallout;
283 m = so->so_rcv.sb_mb;
284 cc = so->so_rcv.sb_cc;
285 inspaces = spaces = 0;
286 for (m = so->so_rcv.sb_mb; m; m = n) {
287 n = m->m_nextpkt;
288 for (; m; m = m->m_next) {
289 for (i = 0; i < m->m_len; i++, cc--) {
290 switch (*(mtod(m, char *) + i)) {
291 case ' ':
292 /* tabs? '\t' */
293 if (!inspaces) {
294 spaces++;
295 inspaces = 1;
297 break;
298 case '\r':
299 case '\n':
300 DPRINT("newline");
301 goto fallout;
302 default:
303 if (spaces != 2) {
304 inspaces = 0;
305 break;
309 * if we don't have enough characters
310 * left (cc < sizeof("HTTP/1.0") - 1)
311 * then see if the remaining ones
312 * are a request we can parse.
314 if (cc < sizeof("HTTP/1.0") - 1) {
315 if (mbufstrncmp(m, n, i, cc,
316 "HTTP/1.") == 1) {
317 DPRINT("ok");
318 goto readmore;
319 } else {
320 DPRINT("bad");
321 goto fallout;
323 } else if (
324 mbufstrcmp(m, n, i, "HTTP/1.0") ||
325 mbufstrcmp(m, n, i, "HTTP/1.1")) {
326 DPRINT("ok");
327 soishttpconnected(so,
328 arg, events, waitflag);
329 return;
330 } else {
331 DPRINT("bad");
332 goto fallout;
338 readmore:
339 DPRINT("readmore");
341 * if we hit here we haven't hit something
342 * we don't understand or a newline, so try again
344 so->so_upcall = soparsehttpvers;
345 so->so_rcv.sb_flags |= SB_UPCALL;
346 return;
348 fallout:
349 DPRINT("fallout");
350 so->so_upcall = NULL;
351 so->so_rcv.sb_flags &= ~SB_UPCALL;
352 soisconnected(so);
353 return;
357 #define NCHRS 3
359 static void
360 soishttpconnected(struct socket *so, void *arg, int events, int waitflag)
362 char a, b, c;
363 struct mbuf *m, *n;
364 int ccleft, copied;
366 DPRINT("start");
367 if ((so->so_state & SS_CANTRCVMORE) != 0 || sbfull(&so->so_rcv))
368 goto gotit;
371 * Walk the socketbuffer and copy the last NCHRS (3) into a, b, and c
372 * copied - how much we've copied so far
373 * ccleft - how many bytes remaining in the socketbuffer
374 * just loop over the mbufs subtracting from 'ccleft' until we only
375 * have NCHRS left
377 copied = 0;
378 ccleft = so->so_rcv.sb_cc;
379 if (ccleft < NCHRS)
380 goto readmore;
381 a = b = c = '\0';
382 for (m = so->so_rcv.sb_mb; m; m = n) {
383 n = m->m_nextpkt;
384 for (; m; m = m->m_next) {
385 ccleft -= m->m_len;
386 if (ccleft <= NCHRS) {
387 char *src;
388 int tocopy;
390 tocopy = (NCHRS - ccleft) - copied;
391 src = mtod(m, char *) + (m->m_len - tocopy);
393 while (tocopy--) {
394 switch (copied++) {
395 case 0:
396 a = *src++;
397 break;
398 case 1:
399 b = *src++;
400 break;
401 case 2:
402 c = *src++;
403 break;
409 if (c == '\n' && (b == '\n' || (b == '\r' && a == '\n'))) {
410 /* we have all request headers */
411 goto gotit;
414 readmore:
415 so->so_upcall = soishttpconnected;
416 so->so_rcv.sb_flags |= SB_UPCALL;
417 return;
419 gotit:
420 so->so_upcall = NULL;
421 so->so_rcv.sb_flags &= ~SB_UPCALL;
422 soisconnected(so);
423 return;