2007-05-23 21:14:59 +04:00
|
|
|
/* $NetBSD: udp6_output.c,v 1.30 2007/05/23 17:15:04 christos Exp $ */
|
2001-10-15 13:51:15 +04:00
|
|
|
/* $KAME: udp6_output.c,v 1.43 2001/10/15 09:19:52 itojun Exp $ */
|
2001-02-08 19:48:01 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
2001-02-08 19:48:01 +03:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)udp_var.h 8.1 (Berkeley) 6/10/93
|
|
|
|
*/
|
|
|
|
|
2001-11-13 03:56:55 +03:00
|
|
|
#include <sys/cdefs.h>
|
2007-05-23 21:14:59 +04:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: udp6_output.c,v 1.30 2007/05/23 17:15:04 christos Exp $");
|
2001-11-13 03:56:55 +03:00
|
|
|
|
2001-02-08 19:48:01 +03:00
|
|
|
#include "opt_inet.h"
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/syslog.h>
|
2006-05-15 01:19:33 +04:00
|
|
|
#include <sys/kauth.h>
|
2001-02-08 19:48:01 +03:00
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
#include <net/if_types.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_var.h>
|
|
|
|
#include <netinet/in_pcb.h>
|
|
|
|
#include <netinet/udp.h>
|
|
|
|
#include <netinet/udp_var.h>
|
|
|
|
#include <netinet/ip6.h>
|
|
|
|
#include <netinet6/ip6_var.h>
|
|
|
|
#include <netinet6/in6_pcb.h>
|
|
|
|
#include <netinet6/udp6_var.h>
|
|
|
|
#include <netinet/icmp6.h>
|
|
|
|
#include <netinet6/ip6protosw.h>
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
#include <netinet6/scope6_var.h>
|
2001-02-08 19:48:01 +03:00
|
|
|
|
|
|
|
#include "faith.h"
|
|
|
|
|
|
|
|
#include <net/net_osdep.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* UDP protocol inplementation.
|
|
|
|
* Per RFC 768, August, 1980.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2007-05-23 21:14:59 +04:00
|
|
|
udp6_output(struct in6pcb *in6p, struct mbuf *m, struct mbuf *addr6,
|
|
|
|
struct mbuf *control, struct lwp *l)
|
2001-02-08 19:48:01 +03:00
|
|
|
{
|
|
|
|
u_int32_t ulen = m->m_pkthdr.len;
|
|
|
|
u_int32_t plen = sizeof(struct udphdr) + ulen;
|
|
|
|
struct ip6_hdr *ip6;
|
|
|
|
struct udphdr *udp6;
|
2001-10-15 13:51:15 +04:00
|
|
|
struct in6_addr *laddr, *faddr;
|
|
|
|
struct in6_addr laddr_mapped; /* XXX ugly */
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
struct sockaddr_in6 *sin6 = NULL;
|
|
|
|
struct ifnet *oifp = NULL;
|
|
|
|
int scope_ambiguous = 0;
|
2003-09-06 03:20:48 +04:00
|
|
|
u_int16_t fport;
|
2001-02-08 19:48:01 +03:00
|
|
|
int error = 0;
|
2006-05-05 04:03:21 +04:00
|
|
|
struct ip6_pktopts *optp, opt;
|
2001-02-08 19:48:01 +03:00
|
|
|
int priv;
|
2001-10-15 13:51:15 +04:00
|
|
|
int af = AF_INET6, hlen = sizeof(struct ip6_hdr);
|
2001-02-08 19:48:01 +03:00
|
|
|
#ifdef INET
|
|
|
|
struct ip *ip;
|
2001-10-15 13:51:15 +04:00
|
|
|
struct udpiphdr *ui;
|
2001-10-18 11:44:33 +04:00
|
|
|
int flags = 0;
|
2006-05-05 04:03:21 +04:00
|
|
|
#endif
|
2001-02-08 19:48:01 +03:00
|
|
|
struct sockaddr_in6 tmp;
|
|
|
|
|
|
|
|
priv = 0;
|
2006-07-24 02:06:03 +04:00
|
|
|
if (l && !kauth_authorize_generic(l->l_cred, KAUTH_GENERIC_ISSUSER,
|
2007-01-04 22:07:03 +03:00
|
|
|
NULL))
|
2001-02-08 19:48:01 +03:00
|
|
|
priv = 1;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
if (addr6) {
|
|
|
|
if (addr6->m_len != sizeof(*sin6)) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
sin6 = mtod(addr6, struct sockaddr_in6 *);
|
|
|
|
if (sin6->sin6_family != AF_INET6) {
|
|
|
|
error = EAFNOSUPPORT;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* protect *sin6 from overwrites */
|
|
|
|
tmp = *sin6;
|
|
|
|
sin6 = &tmp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Application should provide a proper zone ID or the use of
|
|
|
|
* default zone IDs should be enabled. Unfortunately, some
|
|
|
|
* applications do not behave as it should, so we need a
|
|
|
|
* workaround. Even if an appropriate ID is not determined,
|
|
|
|
* we'll see if we can determine the outgoing interface. If we
|
|
|
|
* can, determine the zone ID based on the interface below.
|
|
|
|
*/
|
|
|
|
if (sin6->sin6_scope_id == 0 && !ip6_use_defzone)
|
|
|
|
scope_ambiguous = 1;
|
|
|
|
if ((error = sa6_embedscope(sin6, ip6_use_defzone)) != 0)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2001-02-08 19:48:01 +03:00
|
|
|
if (control) {
|
2006-05-05 04:03:21 +04:00
|
|
|
if ((error = ip6_setpktopts(control, &opt,
|
|
|
|
in6p->in6p_outputopts, priv, IPPROTO_UDP)) != 0)
|
2001-02-08 19:48:01 +03:00
|
|
|
goto release;
|
2006-05-05 04:03:21 +04:00
|
|
|
optp = &opt;
|
|
|
|
} else
|
|
|
|
optp = in6p->in6p_outputopts;
|
|
|
|
|
2001-02-08 19:48:01 +03:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (sin6) {
|
|
|
|
faddr = &sin6->sin6_addr;
|
|
|
|
|
2001-02-08 19:48:01 +03:00
|
|
|
/*
|
|
|
|
* IPv4 version of udp_output calls in_pcbconnect in this case,
|
|
|
|
* which needs splnet and affects performance.
|
|
|
|
* Since we saw no essential reason for calling in_pcbconnect,
|
|
|
|
* we get rid of such kind of logic, and call in6_selectsrc
|
|
|
|
* and in6_pcbsetport in order to fill in the local address
|
|
|
|
* and the local port.
|
|
|
|
*/
|
|
|
|
if (sin6->sin6_port == 0) {
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
2001-10-15 13:51:15 +04:00
|
|
|
/* how about ::ffff:0.0.0.0 case? */
|
2001-02-08 19:48:01 +03:00
|
|
|
error = EISCONN;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
faddr = &sin6->sin6_addr;
|
|
|
|
fport = sin6->sin6_port; /* allow 0 port */
|
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
if (IN6_IS_ADDR_V4MAPPED(faddr)) {
|
|
|
|
if ((in6p->in6p_flags & IN6P_IPV6_V6ONLY))
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* I believe we should explicitly discard the
|
|
|
|
* packet when mapped addresses are disabled,
|
|
|
|
* rather than send the packet as an IPv6 one.
|
|
|
|
* If we chose the latter approach, the packet
|
|
|
|
* might be sent out on the wire based on the
|
|
|
|
* default route, the situation which we'd
|
|
|
|
* probably want to avoid.
|
|
|
|
* (20010421 jinmei@kame.net)
|
|
|
|
*/
|
|
|
|
error = EINVAL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)
|
|
|
|
&& !IN6_IS_ADDR_V4MAPPED(&in6p->in6p_laddr)) {
|
|
|
|
/*
|
2002-06-09 00:06:44 +04:00
|
|
|
* when remote addr is an IPv4-mapped address,
|
2001-10-15 13:51:15 +04:00
|
|
|
* local addr should not be an IPv6 address,
|
2002-06-09 00:06:44 +04:00
|
|
|
* since you cannot determine how to map IPv6
|
2001-10-15 13:51:15 +04:00
|
|
|
* source address to IPv4.
|
|
|
|
*/
|
|
|
|
error = EINVAL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
af = AF_INET;
|
|
|
|
}
|
|
|
|
|
2001-02-08 19:48:01 +03:00
|
|
|
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
|
2006-05-05 04:03:21 +04:00
|
|
|
laddr = in6_selectsrc(sin6, optp,
|
KNF: de-__P, bzero -> memset, bcmp -> memcmp. Remove extraneous
parentheses in return statements.
Cosmetic: don't open-code TAILQ_FOREACH().
Cosmetic: change types of variables to avoid oodles of casts: in
in6_src.c, avoid casts by changing several route_in6 pointers
to struct route pointers. Remove unnecessary casts to caddr_t
elsewhere.
Pave the way for eliminating address family-specific route caches:
soon, struct route will not embed a sockaddr, but it will hold
a reference to an external sockaddr, instead. We will set the
destination sockaddr using rtcache_setdst(). (I created a stub
for it, but it isn't used anywhere, yet.) rtcache_free() will
free the sockaddr. I have extracted from rtcache_free() a helper
subroutine, rtcache_clear(). rtcache_clear() will "forget" a
cached route, but it will not forget the destination by releasing
the sockaddr. I use rtcache_clear() instead of rtcache_free()
in rtcache_update(), because rtcache_update() is not supposed
to forget the destination.
Constify:
1 Introduce const accessor for route->ro_dst, rtcache_getdst().
2 Constify the 'dst' argument to ifnet->if_output(). This
led me to constify a lot of code called by output routines.
3 Constify the sockaddr argument to protosw->pr_ctlinput. This
led me to constify a lot of code called by ctlinput routines.
4 Introduce const macros for converting from a generic sockaddr
to family-specific sockaddrs, e.g., sockaddr_in: satocsin6,
satocsin, et cetera.
2007-02-18 01:34:07 +03:00
|
|
|
in6p->in6p_moptions,
|
|
|
|
(struct route *)&in6p->in6p_route,
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
&in6p->in6p_laddr, &oifp, &error);
|
|
|
|
if (oifp && scope_ambiguous &&
|
|
|
|
(error = in6_setscope(&sin6->sin6_addr,
|
|
|
|
oifp, NULL))) {
|
|
|
|
goto release;
|
|
|
|
}
|
2001-10-15 13:51:15 +04:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* XXX: freebsd[34] does not have in_selectsrc, but
|
|
|
|
* we can omit the whole part because freebsd4 calls
|
|
|
|
* udp_output() directly in this case, and thus we'll
|
|
|
|
* never see this path.
|
|
|
|
*/
|
|
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) {
|
|
|
|
struct sockaddr_in *sinp, sin_dst;
|
|
|
|
|
|
|
|
bzero(&sin_dst, sizeof(sin_dst));
|
|
|
|
sin_dst.sin_family = AF_INET;
|
|
|
|
sin_dst.sin_len = sizeof(sin_dst);
|
|
|
|
bcopy(&faddr->s6_addr[12], &sin_dst.sin_addr,
|
|
|
|
sizeof(sin_dst.sin_addr));
|
|
|
|
sinp = in_selectsrc(&sin_dst,
|
|
|
|
(struct route *)&in6p->in6p_route,
|
|
|
|
in6p->in6p_socket->so_options,
|
|
|
|
NULL, &error);
|
|
|
|
if (sinp == NULL) {
|
|
|
|
if (error == 0)
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
bzero(&laddr_mapped, sizeof(laddr_mapped));
|
|
|
|
laddr_mapped.s6_addr16[5] = 0xffff; /* ugly */
|
|
|
|
bcopy(&sinp->sin_addr,
|
|
|
|
&laddr_mapped.s6_addr[12],
|
|
|
|
sizeof(sinp->sin_addr));
|
|
|
|
laddr = &laddr_mapped;
|
|
|
|
} else
|
|
|
|
{
|
|
|
|
laddr = &in6p->in6p_laddr; /* XXX */
|
|
|
|
}
|
|
|
|
}
|
2001-02-08 19:48:01 +03:00
|
|
|
if (laddr == NULL) {
|
|
|
|
if (error == 0)
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
if (in6p->in6p_lport == 0 &&
|
2006-07-24 02:06:03 +04:00
|
|
|
(error = in6_pcbsetport(laddr, in6p, l)) != 0)
|
2001-02-08 19:48:01 +03:00
|
|
|
goto release;
|
|
|
|
} else {
|
|
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
|
|
error = ENOTCONN;
|
|
|
|
goto release;
|
|
|
|
}
|
2001-10-15 13:51:15 +04:00
|
|
|
if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_faddr)) {
|
|
|
|
if ((in6p->in6p_flags & IN6P_IPV6_V6ONLY))
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* XXX: this case would happen when the
|
|
|
|
* application sets the V6ONLY flag after
|
|
|
|
* connecting the foreign address.
|
|
|
|
* Such applications should be fixed,
|
|
|
|
* so we bark here.
|
|
|
|
*/
|
|
|
|
log(LOG_INFO, "udp6_output: IPV6_V6ONLY "
|
|
|
|
"option was set for a connected socket\n");
|
|
|
|
error = EINVAL;
|
|
|
|
goto release;
|
|
|
|
} else
|
|
|
|
af = AF_INET;
|
|
|
|
}
|
2001-02-08 19:48:01 +03:00
|
|
|
laddr = &in6p->in6p_laddr;
|
|
|
|
faddr = &in6p->in6p_faddr;
|
|
|
|
fport = in6p->in6p_fport;
|
|
|
|
}
|
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
if (af == AF_INET)
|
2001-02-08 19:48:01 +03:00
|
|
|
hlen = sizeof(struct ip);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Calculate data length and get a mbuf
|
|
|
|
* for UDP and IP6 headers.
|
|
|
|
*/
|
|
|
|
M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT);
|
|
|
|
if (m == 0) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stuff checksum and output datagram.
|
|
|
|
*/
|
2007-03-04 08:59:00 +03:00
|
|
|
udp6 = (struct udphdr *)(mtod(m, char *) + hlen);
|
2001-02-08 19:48:01 +03:00
|
|
|
udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */
|
|
|
|
udp6->uh_dport = fport;
|
|
|
|
if (plen <= 0xffff)
|
2003-09-06 03:20:48 +04:00
|
|
|
udp6->uh_ulen = htons((u_int16_t)plen);
|
2001-02-08 19:48:01 +03:00
|
|
|
else
|
|
|
|
udp6->uh_ulen = 0;
|
|
|
|
udp6->uh_sum = 0;
|
|
|
|
|
|
|
|
switch (af) {
|
|
|
|
case AF_INET6:
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK;
|
|
|
|
ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
|
|
|
|
ip6->ip6_vfc |= IPV6_VERSION;
|
|
|
|
#if 0 /* ip6_plen will be filled in ip6_output. */
|
2003-09-06 03:20:48 +04:00
|
|
|
ip6->ip6_plen = htons((u_int16_t)plen);
|
2001-02-08 19:48:01 +03:00
|
|
|
#endif
|
|
|
|
ip6->ip6_nxt = IPPROTO_UDP;
|
|
|
|
ip6->ip6_hlim = in6_selecthlim(in6p,
|
|
|
|
in6p->in6p_route.ro_rt ?
|
|
|
|
in6p->in6p_route.ro_rt->rt_ifp : NULL);
|
|
|
|
ip6->ip6_src = *laddr;
|
|
|
|
ip6->ip6_dst = *faddr;
|
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
udp6->uh_sum = in6_cksum_phdr(laddr, faddr,
|
|
|
|
htonl(plen), htonl(IPPROTO_UDP));
|
|
|
|
m->m_pkthdr.csum_flags = M_CSUM_UDPv6;
|
|
|
|
m->m_pkthdr.csum_data = offsetof(struct udphdr, uh_sum);
|
2001-02-08 19:48:01 +03:00
|
|
|
|
|
|
|
udp6stat.udp6s_opackets++;
|
2006-05-05 04:03:21 +04:00
|
|
|
error = ip6_output(m, optp, &in6p->in6p_route, 0,
|
|
|
|
in6p->in6p_moptions, in6p->in6p_socket, NULL);
|
2001-02-08 19:48:01 +03:00
|
|
|
break;
|
|
|
|
case AF_INET:
|
|
|
|
#ifdef INET
|
|
|
|
/* can't transmit jumbogram over IPv4 */
|
|
|
|
if (plen > 0xffff) {
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
|
|
|
ip = mtod(m, struct ip *);
|
2001-10-15 13:51:15 +04:00
|
|
|
ui = (struct udpiphdr *)ip;
|
|
|
|
bzero(ui->ui_x1, sizeof ui->ui_x1);
|
|
|
|
ui->ui_pr = IPPROTO_UDP;
|
|
|
|
ui->ui_len = htons(plen);
|
2001-12-18 06:04:02 +03:00
|
|
|
bcopy(&laddr->s6_addr[12], &ui->ui_src, sizeof(ui->ui_src));
|
2001-10-15 13:51:15 +04:00
|
|
|
ui->ui_ulen = ui->ui_len;
|
|
|
|
|
|
|
|
flags = (in6p->in6p_socket->so_options &
|
|
|
|
(SO_DONTROUTE | SO_BROADCAST));
|
2001-12-18 06:04:02 +03:00
|
|
|
bcopy(&faddr->s6_addr[12], &ui->ui_dst, sizeof(ui->ui_dst));
|
2004-12-15 07:25:19 +03:00
|
|
|
|
2005-04-22 15:56:33 +04:00
|
|
|
udp6->uh_sum = in_cksum(m, hlen + plen);
|
|
|
|
if (udp6->uh_sum == 0)
|
|
|
|
udp6->uh_sum = 0xffff;
|
2001-02-08 19:48:01 +03:00
|
|
|
|
2002-08-14 04:23:27 +04:00
|
|
|
ip->ip_len = htons(hlen + plen);
|
2001-10-15 13:51:15 +04:00
|
|
|
ip->ip_ttl = in6_selecthlim(in6p, NULL); /* XXX */
|
|
|
|
ip->ip_tos = 0; /* XXX */
|
2001-02-08 19:48:01 +03:00
|
|
|
|
|
|
|
udpstat.udps_opackets++;
|
2003-08-15 07:42:00 +04:00
|
|
|
error = ip_output(m, NULL, &in6p->in6p_route, flags /* XXX */,
|
2003-08-23 01:53:01 +04:00
|
|
|
(struct ip_moptions *)NULL,
|
|
|
|
(struct socket *)in6p->in6p_socket);
|
2001-02-08 19:48:01 +03:00
|
|
|
break;
|
|
|
|
#else
|
|
|
|
error = EAFNOSUPPORT;
|
|
|
|
goto release;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
goto releaseopt;
|
|
|
|
|
|
|
|
release:
|
|
|
|
m_freem(m);
|
|
|
|
|
|
|
|
releaseopt:
|
|
|
|
if (control) {
|
2006-05-05 04:03:21 +04:00
|
|
|
ip6_clearpktopts(&opt, -1);
|
2001-02-08 19:48:01 +03:00
|
|
|
m_freem(control);
|
|
|
|
}
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
2001-02-08 19:48:01 +03:00
|
|
|
}
|