/* $NetBSD: udp6_usrreq.c,v 1.20 2000/02/01 22:52:12 thorpej Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* * Copyright (c) 1982, 1986, 1989, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * @(#)udp_var.h 8.1 (Berkeley) 6/10/93 */ #include "opt_ipsec.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef IPSEC #include #endif /*IPSEC*/ #include "faith.h" /* * UDP protocol inplementation. * Per RFC 768, August, 1980. */ struct in6pcb *udp6_last_in6pcb = &udb6; #ifdef UDP6 static int in6_mcmatch __P((struct in6pcb *, struct in6_addr *, struct ifnet *)); #endif static void udp6_detach __P((struct in6pcb *)); static void udp6_notify __P((struct in6pcb *, int)); void udp6_init() { udb6.in6p_next = udb6.in6p_prev = &udb6; } #ifdef UDP6 static int in6_mcmatch(in6p, ia6, ifp) struct in6pcb *in6p; register struct in6_addr *ia6; struct ifnet *ifp; { struct ip6_moptions *im6o = in6p->in6p_moptions; struct in6_multi_mship *imm; if (im6o == NULL) return 0; for (imm = im6o->im6o_memberships.lh_first; imm != NULL; imm = imm->i6mm_chain.le_next) { if ((ifp == NULL || imm->i6mm_maddr->in6m_ifp == ifp) && IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr, ia6)) return 1; } return 0; } int udp6_input(mp, offp, proto) struct mbuf **mp; int *offp, proto; { struct mbuf *m = *mp; register struct ip6_hdr *ip6; register struct udphdr *uh; register struct in6pcb *in6p; struct mbuf *opts = 0; int off = *offp; u_int32_t plen, ulen; struct sockaddr_in6 udp_in6; #if defined(NFAITH) && 0 < NFAITH if (m->m_pkthdr.rcvif) { if (m->m_pkthdr.rcvif->if_type == IFT_FAITH) { /* send icmp6 host unreach? */ m_freem(m); return IPPROTO_DONE; } } #endif udp6stat.udp6s_ipackets++; ip6 = mtod(m, struct ip6_hdr *); /* check for jumbogram is done in ip6_input. we can trust pkthdr.len */ plen = m->m_pkthdr.len - off; #ifndef PULLDOWN_TEST IP6_EXTHDR_CHECK(m, off, sizeof(struct udphdr), IPPROTO_DONE); uh = (struct udphdr *)((caddr_t)ip6 + off); #else IP6_EXTHDR_GET(uh, struct udphdr *, m, off, sizeof(struct udhpdr)); if (uh == NULL) { udp6stat.udp6s_hdrops++; return IPPROTO_DONE; } #endif ulen = ntohs((u_short)uh->uh_ulen); if (ulen == 0 && plen > 0xffff) /* jumbogram */ ulen = plen; if (plen != ulen) { udp6stat.udp6s_badlen++; goto bad; } /* destination port of 0 is illegal, based on RFC768. */ if (uh->uh_dport == 0) goto bad; /* Be proactive about malicious use of IPv4 mapped address */ if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { /* XXX stat */ goto bad; } /* * Checksum extended UDP header and data. */ if (uh->uh_sum == 0) udp6stat.udp6s_nosum++; else if (in6_cksum(m, IPPROTO_UDP, off, ulen) != 0) { udp6stat.udp6s_badsum++; goto bad; } if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) { struct in6pcb *last; /* * Deliver a multicast datagram to all sockets * for which the local and remote addresses and ports match * those of the incoming datagram. This allows more than * one process to receive multicasts on the same port. * (This really ought to be done for unicast datagrams as * well, but that would cause problems with existing * applications that open both address-specific sockets and * a wildcard socket listening to the same port -- they would * end up receiving duplicates of every unicast datagram. * Those applications open the multiple sockets to overcome an * inadequacy of the UDP socket interface, but for backwards * compatibility we avoid the problem here rather than * fixing the interface. Maybe 4.5BSD will remedy this?) */ /* * In a case that laddr should be set to the link-local * address (this happens in RIPng), the multicast address * specified in the received packet does not match with * laddr. To cure this situation, the matching is relaxed * if the receiving interface is the same as one specified * in the socket and if the destination multicast address * matches one of the multicast groups specified in the socket. */ /* * Construct sockaddr format source address. */ bzero(&udp_in6, sizeof(udp_in6)); udp_in6.sin6_len = sizeof(struct sockaddr_in6); udp_in6.sin6_family = AF_INET6; udp_in6.sin6_port = uh->uh_sport; udp_in6.sin6_addr = ip6->ip6_src; if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) udp_in6.sin6_addr.s6_addr16[1] = 0; if (m->m_pkthdr.rcvif) { if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) { udp_in6.sin6_scope_id = m->m_pkthdr.rcvif->if_index; } else udp_in6.sin6_scope_id = 0; } else udp_in6.sin6_scope_id = 0; /* * KAME note: usually we drop udphdr from mbuf here. * We need udphdr for IPsec processing so we do that later. */ /* * Locate pcb(s) for datagram. * (Algorithm copied from raw_intr().) */ last = NULL; for (in6p = udb6.in6p_next; in6p != &udb6; in6p = in6p->in6p_next) { if (in6p->in6p_lport != uh->uh_dport) continue; if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) { if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst) && !in6_mcmatch(in6p, &ip6->ip6_dst, m->m_pkthdr.rcvif)) continue; } if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src) || in6p->in6p_fport != uh->uh_sport) continue; } if (last != NULL) { struct mbuf *n; #ifdef IPSEC /* * Check AH/ESP integrity. */ if (last != NULL && ipsec6_in_reject(m, last)) { ipsec6stat.in_polvio++; /* do not inject data into pcb */ } else #endif /*IPSEC*/ if ((n = m_copy(m, 0, M_COPYALL)) != NULL) { /* * KAME NOTE: do not * m_copy(m, offset, ...) above. * sbappendaddr() expects M_PKTHDR, * and m_copy() will copy M_PKTHDR * only if offset is 0. */ if (last->in6p_flags & IN6P_CONTROLOPTS || last->in6p_socket->so_options & SO_TIMESTAMP) { ip6_savecontrol(last, &opts, ip6, n); } m_adj(n, off + sizeof(struct udphdr)); if (sbappendaddr(&last->in6p_socket->so_rcv, (struct sockaddr *)&udp_in6, n, opts) == 0) { m_freem(n); if (opts) m_freem(opts); udp6stat.udp6s_fullsock++; } else sorwakeup(last->in6p_socket); opts = 0; } } last = in6p; /* * Don't look for additional matches if this one does * not have either the SO_REUSEPORT or SO_REUSEADDR * socket options set. This heuristic avoids searching * through all pcbs in the common case of a non-shared * port. It assumes that an application will never * clear these options after setting them. */ if ((last->in6p_socket->so_options & (SO_REUSEPORT|SO_REUSEADDR)) == 0) break; } if (last == NULL) { /* * No matching pcb found; discard datagram. * (No need to send an ICMP Port Unreachable * for a broadcast or multicast datgram.) */ udp6stat.udp6s_noport++; udp6stat.udp6s_noportmcast++; goto bad; } #ifdef IPSEC /* * Check AH/ESP integrity. */ if (last != NULL && ipsec6_in_reject(m, last)) { ipsec6stat.in_polvio++; goto bad; } #endif /*IPSEC*/ if (last->in6p_flags & IN6P_CONTROLOPTS || last->in6p_socket->so_options & SO_TIMESTAMP) { ip6_savecontrol(last, &opts, ip6, m); } m_adj(m, off + sizeof(struct udphdr)); if (sbappendaddr(&last->in6p_socket->so_rcv, (struct sockaddr *)&udp_in6, m, opts) == 0) { udp6stat.udp6s_fullsock++; goto bad; } sorwakeup(last->in6p_socket); return IPPROTO_DONE; } /* * Locate pcb for datagram. */ in6p = udp6_last_in6pcb; if (in6p->in6p_lport != uh->uh_dport || in6p->in6p_fport != uh->uh_sport || !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src) || !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst)) { in6p = in6_pcblookup(&udb6, &ip6->ip6_src, uh->uh_sport, &ip6->ip6_dst, uh->uh_dport, IN6PLOOKUP_WILDCARD); if (in6p) udp6_last_in6pcb = in6p; udp6stat.udp6ps_pcbcachemiss++; } if (in6p == 0) { udp6stat.udp6s_noport++; if (m->m_flags & M_MCAST) { printf("UDP6: M_MCAST is set in a unicast packet.\n"); udp6stat.udp6s_noportmcast++; goto bad; } icmp6_error(m, ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOPORT, 0); return IPPROTO_DONE; } #ifdef IPSEC /* * Check AH/ESP integrity. */ if (in6p != NULL && ipsec6_in_reject(m, in6p)) { ipsec6stat.in_polvio++; goto bad; } #endif /*IPSEC*/ /* * Construct sockaddr format source address. * Stuff source address and datagram in user buffer. */ bzero(&udp_in6, sizeof(udp_in6)); udp_in6.sin6_len = sizeof(struct sockaddr_in6); udp_in6.sin6_family = AF_INET6; udp_in6.sin6_port = uh->uh_sport; udp_in6.sin6_addr = ip6->ip6_src; if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) udp_in6.sin6_addr.s6_addr16[1] = 0; if (m->m_pkthdr.rcvif) { if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) udp_in6.sin6_scope_id = m->m_pkthdr.rcvif->if_index; else udp_in6.sin6_scope_id = 0; } else udp_in6.sin6_scope_id = 0; if (in6p->in6p_flags & IN6P_CONTROLOPTS || in6p->in6p_socket->so_options & SO_TIMESTAMP) { ip6_savecontrol(in6p, &opts, ip6, m); } m_adj(m, off + sizeof(struct udphdr)); if (sbappendaddr(&in6p->in6p_socket->so_rcv, (struct sockaddr *)&udp_in6, m, opts) == 0) { udp6stat.udp6s_fullsock++; goto bad; } sorwakeup(in6p->in6p_socket); return IPPROTO_DONE; bad: if (m) m_freem(m); if (opts) m_freem(opts); return IPPROTO_DONE; } #endif /* * Notify a udp user of an asynchronous error; * just wake up so tat he can collect error status. */ static void udp6_notify(in6p, errno) register struct in6pcb *in6p; int errno; { in6p->in6p_socket->so_error = errno; sorwakeup(in6p->in6p_socket); sowwakeup(in6p->in6p_socket); } void udp6_ctlinput(cmd, sa, d) int cmd; struct sockaddr *sa; void *d; { register struct udphdr *uhp; struct udphdr uh; struct sockaddr_in6 sa6; register struct ip6_hdr *ip6; struct mbuf *m; int off; if (sa->sa_family != AF_INET6 || sa->sa_len != sizeof(struct sockaddr_in6)) return; #if 0 if (cmd == PRC_IFNEWADDR) in6_mrejoin(&udb6); else #endif if (!PRC_IS_REDIRECT(cmd) && ((unsigned)cmd >= PRC_NCMDS || inet6ctlerrmap[cmd] == 0)) return; /* if the parameter is from icmp6, decode it. */ if (d != NULL) { struct ip6ctlparam *ip6cp = (struct ip6ctlparam *)d; m = ip6cp->ip6c_m; ip6 = ip6cp->ip6c_ip6; off = ip6cp->ip6c_off; } else { m = NULL; ip6 = NULL; } /* translate addresses into internal form */ sa6 = *(struct sockaddr_in6 *)sa; if (IN6_IS_ADDR_LINKLOCAL(&sa6.sin6_addr)) sa6.sin6_addr.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index); if (ip6) { /* * XXX: We assume that when IPV6 is non NULL, * M and OFF are valid. */ struct in6_addr s; /* translate addresses into internal form */ memcpy(&s, &ip6->ip6_src, sizeof(s)); if (IN6_IS_ADDR_LINKLOCAL(&s)) s.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index); if (m->m_len < off + sizeof(uh)) { /* * this should be rare case, * so we compromise on this copy... */ m_copydata(m, off, sizeof(uh), (caddr_t)&uh); uhp = &uh; } else uhp = (struct udphdr *)(mtod(m, caddr_t) + off); (void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6, uhp->uh_dport, &s, uhp->uh_sport, cmd, udp6_notify); } else { (void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6, 0, &zeroin6_addr, 0, cmd, udp6_notify); } } int udp6_output(in6p, m, addr6, control) register struct in6pcb *in6p; register struct mbuf *m; struct mbuf *addr6, *control; { register u_int32_t ulen = m->m_pkthdr.len; u_int32_t plen = sizeof(struct udphdr) + ulen; struct ip6_hdr *ip6; struct udphdr *udp6; struct in6_addr *laddr, *faddr; u_short fport; int error = 0; struct ip6_pktopts opt, *stickyopt = in6p->in6p_outputopts; int priv; struct proc *p = curproc; /* XXX */ int af, hlen; #ifdef INET struct ip *ip; #endif priv = 0; if (p && !suser(p->p_ucred, &p->p_acflag)) priv = 1; if (control) { if ((error = ip6_setpktoptions(control, &opt, priv)) != 0) goto release; in6p->in6p_outputopts = &opt; } if (addr6) { /* * IPv4 version of udp_output calls in_pcbconnect in this case, * which needs splnet and affects performance. * Since we saw no essential reason for calling in_pcbconnect, * we get rid of such kind of logic, and call in6_selectsrc * and In6_pcbsetport in order to fill in the local address * and the local port. */ struct sockaddr_in6 *sin6 = mtod(addr6, struct sockaddr_in6 *); if (addr6->m_len != sizeof(*sin6)) { error = EINVAL; goto release; } if (sin6->sin6_family != AF_INET6) { error = EAFNOSUPPORT; goto release; } if (sin6->sin6_port == 0) { error = EADDRNOTAVAIL; goto release; } if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { error = EISCONN; goto release; } faddr = &sin6->sin6_addr; fport = sin6->sin6_port; /* allow 0 port */ /* * If the scope of the destination is link-local, * embed the interface * index in the address. * * XXX advanced-api value overrides sin6_scope_id */ if (IN6_IS_ADDR_LINKLOCAL(faddr) || IN6_IS_ADDR_MC_LINKLOCAL(faddr)) { struct ip6_pktopts *optp = in6p->in6p_outputopts; struct in6_pktinfo *pi = NULL; struct ifnet *oifp = NULL; struct ip6_moptions *mopt = NULL; /* * XXX Boundary check is assumed to be already done in * ip6_setpktoptions(). */ if (optp && (pi = optp->ip6po_pktinfo) && pi->ipi6_ifindex) { faddr->s6_addr16[1] = htons(pi->ipi6_ifindex); oifp = ifindex2ifnet[pi->ipi6_ifindex]; } else if (IN6_IS_ADDR_MULTICAST(faddr) && (mopt = in6p->in6p_moptions) && mopt->im6o_multicast_ifp) { oifp = mopt->im6o_multicast_ifp; faddr->s6_addr16[1] = oifp->if_index; } else if (sin6->sin6_scope_id) { /* boundary check */ if (sin6->sin6_scope_id < 0 || if_index < sin6->sin6_scope_id) { error = ENXIO; /* XXX EINVAL? */ goto release; } /* XXX */ faddr->s6_addr16[1] = htons(sin6->sin6_scope_id & 0xffff); } } if (!IN6_IS_ADDR_V4MAPPED(faddr)) { laddr = in6_selectsrc(sin6, in6p->in6p_outputopts, in6p->in6p_moptions, &in6p->in6p_route, &in6p->in6p_laddr, &error); } else laddr = &in6p->in6p_laddr; /*XXX*/ if (laddr == NULL) { if (error == 0) error = EADDRNOTAVAIL; goto release; } if (in6p->in6p_lport == 0 && (error = in6_pcbsetport(laddr, in6p)) != 0) goto release; } else { if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { error = ENOTCONN; goto release; } laddr = &in6p->in6p_laddr; faddr = &in6p->in6p_faddr; fport = in6p->in6p_fport; } if (!IN6_IS_ADDR_V4MAPPED(faddr)) { af = AF_INET6; hlen = sizeof(struct ip6_hdr); } else { af = AF_INET; hlen = sizeof(struct ip); } /* * Calculate data length and get a mbuf * for UDP and IP6 headers. */ M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT); if (m == 0) { error = ENOBUFS; goto release; } /* * Stuff checksum and output datagram. */ udp6 = (struct udphdr *)(mtod(m, caddr_t) + hlen); udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */ udp6->uh_dport = fport; if (plen <= 0xffff) udp6->uh_ulen = htons((u_short)plen); else udp6->uh_ulen = 0; udp6->uh_sum = 0; switch (af) { case AF_INET6: ip6 = mtod(m, struct ip6_hdr *); ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK; ip6->ip6_vfc &= ~IPV6_VERSION_MASK; ip6->ip6_vfc |= IPV6_VERSION; #if 0 /* ip6_plen will be filled in ip6_output. */ ip6->ip6_plen = htons((u_short)plen); #endif ip6->ip6_nxt = IPPROTO_UDP; ip6->ip6_hlim = in6_selecthlim(in6p, in6p->in6p_route.ro_rt ? in6p->in6p_route.ro_rt->rt_ifp : NULL); ip6->ip6_src = *laddr; ip6->ip6_dst = *faddr; if ((udp6->uh_sum = in6_cksum(m, IPPROTO_UDP, sizeof(struct ip6_hdr), plen)) == 0) { udp6->uh_sum = 0xffff; } udp6stat.udp6s_opackets++; #ifdef IPSEC m->m_pkthdr.rcvif = (struct ifnet *)in6p->in6p_socket; #endif /*IPSEC*/ error = ip6_output(m, in6p->in6p_outputopts, &in6p->in6p_route, 0, in6p->in6p_moptions, NULL); break; case AF_INET: #ifdef INET /* can't transmit jumbogram over IPv4 */ if (plen > 0xffff) { error = EMSGSIZE; goto release; } ip = mtod(m, struct ip *); ip->ip_len = plen; ip->ip_p = IPPROTO_UDP; ip->ip_ttl = in6p->in6p_hops; /*XXX*/ ip->ip_tos = 0; /*XXX*/ bcopy(&laddr->s6_addr[12], &ip->ip_src, sizeof(ip->ip_src)); bcopy(&faddr->s6_addr[12], &ip->ip_dst, sizeof(ip->ip_dst)); udp6->uh_sum = 0; if ((udp6->uh_sum = in_cksum(m, ulen)) == 0) udp6->uh_sum = 0xffff; udpstat.udps_opackets++; #ifdef IPSEC m->m_pkthdr.rcvif = NULL; /*XXX*/ #endif /*IPSEC*/ error = ip_output(m, NULL, &in6p->in6p_route, 0 /*XXX*/); break; #else error = EAFNOSUPPORT; goto release; #endif } goto releaseopt; release: m_freem(m); releaseopt: if (control) { in6p->in6p_outputopts = stickyopt; m_freem(control); } return(error); } extern int udp6_sendspace; extern int udp6_recvspace; int udp6_usrreq(so, req, m, addr6, control, p) struct socket *so; int req; struct mbuf *m, *addr6, *control; struct proc *p; { struct in6pcb *in6p = sotoin6pcb(so); int error = 0; int s; /* * MAPPED_ADDR implementation info: * Mapped addr support for PRU_CONTROL is not necessary. * Because typical user of PRU_CONTROL is such as ifconfig, * and they don't associate any addr to their socket. Then * socket family is only hint about the PRU_CONTROL'ed address * family, especially when getting addrs from kernel. * So AF_INET socket need to be used to control AF_INET addrs, * and AF_INET6 socket for AF_INET6 addrs. */ if (req == PRU_CONTROL) return(in6_control(so, (u_long)m, (caddr_t)addr6, (struct ifnet *)control, p)); if (req == PRU_PURGEADDR) { in6_purgeaddr((struct ifaddr *)addr6, (struct ifnet *)control); return (0); } if (in6p == NULL && req != PRU_ATTACH) { error = EINVAL; goto release; } switch (req) { case PRU_ATTACH: /* * MAPPED_ADDR implementation spec: * Always attach for IPv6, * and only when necessary for IPv4. */ if (in6p != NULL) { error = EINVAL; break; } s = splsoftnet(); error = in6_pcballoc(so, &udb6); splx(s); if (error) break; error = soreserve(so, udp6_sendspace, udp6_recvspace); if (error) break; in6p = sotoin6pcb(so); in6p->in6p_cksum = -1; /* just to be sure */ #ifdef IPSEC error = ipsec_init_policy(so, &in6p->in6p_sp); if (error != 0) { in6_pcbdetach(in6p); break; } #endif /*IPSEC*/ break; case PRU_DETACH: udp6_detach(in6p); break; case PRU_BIND: s = splsoftnet(); error = in6_pcbbind(in6p, addr6); splx(s); break; case PRU_LISTEN: error = EOPNOTSUPP; break; case PRU_CONNECT: if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { error = EISCONN; break; } s = splsoftnet(); error = in6_pcbconnect(in6p, addr6); if (ip6_auto_flowlabel) { in6p->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK; in6p->in6p_flowinfo |= (htonl(ip6_flow_seq++) & IPV6_FLOWLABEL_MASK); } splx(s); if (error == 0) soisconnected(so); break; case PRU_CONNECT2: error = EOPNOTSUPP; break; case PRU_ACCEPT: error = EOPNOTSUPP; break; case PRU_DISCONNECT: if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { error = ENOTCONN; break; } s = splsoftnet(); in6_pcbdisconnect(in6p); bzero((caddr_t)&in6p->in6p_laddr, sizeof(in6p->in6p_laddr)); splx(s); so->so_state &= ~SS_ISCONNECTED; /* XXX */ break; case PRU_SHUTDOWN: socantsendmore(so); break; case PRU_SEND: return(udp6_output(in6p, m, addr6, control)); case PRU_ABORT: soisdisconnected(so); udp6_detach(in6p); break; case PRU_SOCKADDR: in6_setsockaddr(in6p, addr6); break; case PRU_PEERADDR: in6_setpeeraddr(in6p, addr6); break; case PRU_SENSE: /* * stat: don't bother with a blocksize */ return(0); case PRU_SENDOOB: case PRU_FASTTIMO: case PRU_SLOWTIMO: case PRU_PROTORCV: case PRU_PROTOSEND: error = EOPNOTSUPP; break; case PRU_RCVD: case PRU_RCVOOB: return(EOPNOTSUPP); /* do not free mbuf's */ default: panic("udp6_usrreq"); } release: if (control) { printf("udp control data unexpectedly retained\n"); m_freem(control); } if (m) m_freem(m); return(error); } static void udp6_detach(in6p) struct in6pcb *in6p; { int s = splsoftnet(); if (in6p == udp6_last_in6pcb) udp6_last_in6pcb = &udb6; in6_pcbdetach(in6p); splx(s); } #include #include int udp6_sysctl(name, namelen, oldp, oldlenp, newp, newlen) int *name; u_int namelen; void *oldp; size_t *oldlenp; void *newp; size_t newlen; { /* All sysctl names at this level are terminal. */ if (namelen != 1) return ENOTDIR; switch (name[0]) { case UDP6CTL_SENDMAX: return sysctl_int(oldp, oldlenp, newp, newlen, &udp6_sendspace); case UDP6CTL_RECVSPACE: return sysctl_int(oldp, oldlenp, newp, newlen, &udp6_recvspace); default: return ENOPROTOOPT; } /* NOTREACHED */ }