d844a3ac41
although this version has been changed somewhat: - reference counting on ifaddrs isn't as complete as Bill's original work was. This is hard to get right, and we should attack one protocol at a time. - This doesn't do reference counting or dynamic allocation of ifnets yet. - This version introduces a new PRU -- PRU_PURGEADDR, which is used to purge an ifaddr from a protocol. The old method Bill used didn't work on all protocols, and it only worked on some because it was Very Lucky. This mostly works ... i.e. works for my USB Ethernet, except for a dangling ifaddr reference left by the IPv6 code; have not yet tracked this down.
985 lines
25 KiB
C
985 lines
25 KiB
C
/* $NetBSD: udp6_usrreq.c,v 1.20 2000/02/01 22:52:12 thorpej Exp $ */
|
|
|
|
/*
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* Copyright (c) 1982, 1986, 1989, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* @(#)udp_var.h 8.1 (Berkeley) 6/10/93
|
|
*/
|
|
|
|
#include "opt_ipsec.h"
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/mbuf.h>
|
|
#include <sys/protosw.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/socketvar.h>
|
|
#include <sys/errno.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/syslog.h>
|
|
|
|
#include <net/if.h>
|
|
#include <net/route.h>
|
|
#include <net/if_types.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_var.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip_var.h>
|
|
#include <netinet/in_pcb.h>
|
|
#include <netinet/udp.h>
|
|
#include <netinet/udp_var.h>
|
|
#include <netinet6/ip6.h>
|
|
#include <netinet6/in6_pcb.h>
|
|
#include <netinet6/ip6_var.h>
|
|
#include <netinet6/icmp6.h>
|
|
#include <netinet6/udp6_var.h>
|
|
#include <netinet6/ip6protosw.h>
|
|
|
|
#ifdef IPSEC
|
|
#include <netinet6/ipsec.h>
|
|
#endif /*IPSEC*/
|
|
|
|
#include "faith.h"
|
|
|
|
/*
|
|
* UDP protocol inplementation.
|
|
* Per RFC 768, August, 1980.
|
|
*/
|
|
|
|
struct in6pcb *udp6_last_in6pcb = &udb6;
|
|
|
|
#ifdef UDP6
|
|
static int in6_mcmatch __P((struct in6pcb *, struct in6_addr *, struct ifnet *));
|
|
#endif
|
|
static void udp6_detach __P((struct in6pcb *));
|
|
static void udp6_notify __P((struct in6pcb *, int));
|
|
|
|
void
|
|
udp6_init()
|
|
{
|
|
udb6.in6p_next = udb6.in6p_prev = &udb6;
|
|
}
|
|
|
|
#ifdef UDP6
|
|
static int
|
|
in6_mcmatch(in6p, ia6, ifp)
|
|
struct in6pcb *in6p;
|
|
register struct in6_addr *ia6;
|
|
struct ifnet *ifp;
|
|
{
|
|
struct ip6_moptions *im6o = in6p->in6p_moptions;
|
|
struct in6_multi_mship *imm;
|
|
|
|
if (im6o == NULL)
|
|
return 0;
|
|
|
|
for (imm = im6o->im6o_memberships.lh_first; imm != NULL;
|
|
imm = imm->i6mm_chain.le_next) {
|
|
if ((ifp == NULL ||
|
|
imm->i6mm_maddr->in6m_ifp == ifp) &&
|
|
IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
|
|
ia6))
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
udp6_input(mp, offp, proto)
|
|
struct mbuf **mp;
|
|
int *offp, proto;
|
|
{
|
|
struct mbuf *m = *mp;
|
|
register struct ip6_hdr *ip6;
|
|
register struct udphdr *uh;
|
|
register struct in6pcb *in6p;
|
|
struct mbuf *opts = 0;
|
|
int off = *offp;
|
|
u_int32_t plen, ulen;
|
|
struct sockaddr_in6 udp_in6;
|
|
|
|
#if defined(NFAITH) && 0 < NFAITH
|
|
if (m->m_pkthdr.rcvif) {
|
|
if (m->m_pkthdr.rcvif->if_type == IFT_FAITH) {
|
|
/* send icmp6 host unreach? */
|
|
m_freem(m);
|
|
return IPPROTO_DONE;
|
|
}
|
|
}
|
|
#endif
|
|
udp6stat.udp6s_ipackets++;
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
/* check for jumbogram is done in ip6_input. we can trust pkthdr.len */
|
|
plen = m->m_pkthdr.len - off;
|
|
#ifndef PULLDOWN_TEST
|
|
IP6_EXTHDR_CHECK(m, off, sizeof(struct udphdr), IPPROTO_DONE);
|
|
uh = (struct udphdr *)((caddr_t)ip6 + off);
|
|
#else
|
|
IP6_EXTHDR_GET(uh, struct udphdr *, m, off, sizeof(struct udhpdr));
|
|
if (uh == NULL) {
|
|
udp6stat.udp6s_hdrops++;
|
|
return IPPROTO_DONE;
|
|
}
|
|
#endif
|
|
ulen = ntohs((u_short)uh->uh_ulen);
|
|
if (ulen == 0 && plen > 0xffff) /* jumbogram */
|
|
ulen = plen;
|
|
|
|
if (plen != ulen) {
|
|
udp6stat.udp6s_badlen++;
|
|
goto bad;
|
|
}
|
|
|
|
/* destination port of 0 is illegal, based on RFC768. */
|
|
if (uh->uh_dport == 0)
|
|
goto bad;
|
|
|
|
/* Be proactive about malicious use of IPv4 mapped address */
|
|
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
|
|
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
|
|
/* XXX stat */
|
|
goto bad;
|
|
}
|
|
|
|
/*
|
|
* Checksum extended UDP header and data.
|
|
*/
|
|
if (uh->uh_sum == 0)
|
|
udp6stat.udp6s_nosum++;
|
|
else if (in6_cksum(m, IPPROTO_UDP, off, ulen) != 0) {
|
|
udp6stat.udp6s_badsum++;
|
|
goto bad;
|
|
}
|
|
|
|
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
|
|
struct in6pcb *last;
|
|
|
|
/*
|
|
* Deliver a multicast datagram to all sockets
|
|
* for which the local and remote addresses and ports match
|
|
* those of the incoming datagram. This allows more than
|
|
* one process to receive multicasts on the same port.
|
|
* (This really ought to be done for unicast datagrams as
|
|
* well, but that would cause problems with existing
|
|
* applications that open both address-specific sockets and
|
|
* a wildcard socket listening to the same port -- they would
|
|
* end up receiving duplicates of every unicast datagram.
|
|
* Those applications open the multiple sockets to overcome an
|
|
* inadequacy of the UDP socket interface, but for backwards
|
|
* compatibility we avoid the problem here rather than
|
|
* fixing the interface. Maybe 4.5BSD will remedy this?)
|
|
*/
|
|
|
|
/*
|
|
* In a case that laddr should be set to the link-local
|
|
* address (this happens in RIPng), the multicast address
|
|
* specified in the received packet does not match with
|
|
* laddr. To cure this situation, the matching is relaxed
|
|
* if the receiving interface is the same as one specified
|
|
* in the socket and if the destination multicast address
|
|
* matches one of the multicast groups specified in the socket.
|
|
*/
|
|
|
|
/*
|
|
* Construct sockaddr format source address.
|
|
*/
|
|
bzero(&udp_in6, sizeof(udp_in6));
|
|
udp_in6.sin6_len = sizeof(struct sockaddr_in6);
|
|
udp_in6.sin6_family = AF_INET6;
|
|
udp_in6.sin6_port = uh->uh_sport;
|
|
udp_in6.sin6_addr = ip6->ip6_src;
|
|
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
|
|
udp_in6.sin6_addr.s6_addr16[1] = 0;
|
|
if (m->m_pkthdr.rcvif) {
|
|
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) {
|
|
udp_in6.sin6_scope_id =
|
|
m->m_pkthdr.rcvif->if_index;
|
|
} else
|
|
udp_in6.sin6_scope_id = 0;
|
|
} else
|
|
udp_in6.sin6_scope_id = 0;
|
|
/*
|
|
* KAME note: usually we drop udphdr from mbuf here.
|
|
* We need udphdr for IPsec processing so we do that later.
|
|
*/
|
|
|
|
/*
|
|
* Locate pcb(s) for datagram.
|
|
* (Algorithm copied from raw_intr().)
|
|
*/
|
|
last = NULL;
|
|
for (in6p = udb6.in6p_next;
|
|
in6p != &udb6;
|
|
in6p = in6p->in6p_next) {
|
|
if (in6p->in6p_lport != uh->uh_dport)
|
|
continue;
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) {
|
|
if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr,
|
|
&ip6->ip6_dst) &&
|
|
!in6_mcmatch(in6p, &ip6->ip6_dst,
|
|
m->m_pkthdr.rcvif))
|
|
continue;
|
|
}
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr,
|
|
&ip6->ip6_src) ||
|
|
in6p->in6p_fport != uh->uh_sport)
|
|
continue;
|
|
}
|
|
|
|
if (last != NULL) {
|
|
struct mbuf *n;
|
|
|
|
#ifdef IPSEC
|
|
/*
|
|
* Check AH/ESP integrity.
|
|
*/
|
|
if (last != NULL && ipsec6_in_reject(m, last)) {
|
|
ipsec6stat.in_polvio++;
|
|
/* do not inject data into pcb */
|
|
} else
|
|
#endif /*IPSEC*/
|
|
if ((n = m_copy(m, 0, M_COPYALL)) != NULL) {
|
|
/*
|
|
* KAME NOTE: do not
|
|
* m_copy(m, offset, ...) above.
|
|
* sbappendaddr() expects M_PKTHDR,
|
|
* and m_copy() will copy M_PKTHDR
|
|
* only if offset is 0.
|
|
*/
|
|
if (last->in6p_flags & IN6P_CONTROLOPTS
|
|
|| last->in6p_socket->so_options & SO_TIMESTAMP) {
|
|
ip6_savecontrol(last, &opts,
|
|
ip6, n);
|
|
}
|
|
|
|
m_adj(n, off + sizeof(struct udphdr));
|
|
if (sbappendaddr(&last->in6p_socket->so_rcv,
|
|
(struct sockaddr *)&udp_in6,
|
|
n, opts) == 0) {
|
|
m_freem(n);
|
|
if (opts)
|
|
m_freem(opts);
|
|
udp6stat.udp6s_fullsock++;
|
|
} else
|
|
sorwakeup(last->in6p_socket);
|
|
opts = 0;
|
|
}
|
|
}
|
|
last = in6p;
|
|
/*
|
|
* Don't look for additional matches if this one does
|
|
* not have either the SO_REUSEPORT or SO_REUSEADDR
|
|
* socket options set. This heuristic avoids searching
|
|
* through all pcbs in the common case of a non-shared
|
|
* port. It assumes that an application will never
|
|
* clear these options after setting them.
|
|
*/
|
|
if ((last->in6p_socket->so_options &
|
|
(SO_REUSEPORT|SO_REUSEADDR)) == 0)
|
|
break;
|
|
}
|
|
|
|
if (last == NULL) {
|
|
/*
|
|
* No matching pcb found; discard datagram.
|
|
* (No need to send an ICMP Port Unreachable
|
|
* for a broadcast or multicast datgram.)
|
|
*/
|
|
udp6stat.udp6s_noport++;
|
|
udp6stat.udp6s_noportmcast++;
|
|
goto bad;
|
|
}
|
|
#ifdef IPSEC
|
|
/*
|
|
* Check AH/ESP integrity.
|
|
*/
|
|
if (last != NULL && ipsec6_in_reject(m, last)) {
|
|
ipsec6stat.in_polvio++;
|
|
goto bad;
|
|
}
|
|
#endif /*IPSEC*/
|
|
if (last->in6p_flags & IN6P_CONTROLOPTS
|
|
|| last->in6p_socket->so_options & SO_TIMESTAMP) {
|
|
ip6_savecontrol(last, &opts, ip6, m);
|
|
}
|
|
|
|
m_adj(m, off + sizeof(struct udphdr));
|
|
if (sbappendaddr(&last->in6p_socket->so_rcv,
|
|
(struct sockaddr *)&udp_in6,
|
|
m, opts) == 0) {
|
|
udp6stat.udp6s_fullsock++;
|
|
goto bad;
|
|
}
|
|
sorwakeup(last->in6p_socket);
|
|
return IPPROTO_DONE;
|
|
}
|
|
/*
|
|
* Locate pcb for datagram.
|
|
*/
|
|
in6p = udp6_last_in6pcb;
|
|
if (in6p->in6p_lport != uh->uh_dport ||
|
|
in6p->in6p_fport != uh->uh_sport ||
|
|
!IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src) ||
|
|
!IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst)) {
|
|
in6p = in6_pcblookup(&udb6,
|
|
&ip6->ip6_src, uh->uh_sport,
|
|
&ip6->ip6_dst, uh->uh_dport,
|
|
IN6PLOOKUP_WILDCARD);
|
|
if (in6p)
|
|
udp6_last_in6pcb = in6p;
|
|
udp6stat.udp6ps_pcbcachemiss++;
|
|
}
|
|
if (in6p == 0) {
|
|
udp6stat.udp6s_noport++;
|
|
if (m->m_flags & M_MCAST) {
|
|
printf("UDP6: M_MCAST is set in a unicast packet.\n");
|
|
udp6stat.udp6s_noportmcast++;
|
|
goto bad;
|
|
}
|
|
icmp6_error(m, ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOPORT, 0);
|
|
return IPPROTO_DONE;
|
|
}
|
|
#ifdef IPSEC
|
|
/*
|
|
* Check AH/ESP integrity.
|
|
*/
|
|
if (in6p != NULL && ipsec6_in_reject(m, in6p)) {
|
|
ipsec6stat.in_polvio++;
|
|
goto bad;
|
|
}
|
|
#endif /*IPSEC*/
|
|
|
|
/*
|
|
* Construct sockaddr format source address.
|
|
* Stuff source address and datagram in user buffer.
|
|
*/
|
|
bzero(&udp_in6, sizeof(udp_in6));
|
|
udp_in6.sin6_len = sizeof(struct sockaddr_in6);
|
|
udp_in6.sin6_family = AF_INET6;
|
|
udp_in6.sin6_port = uh->uh_sport;
|
|
udp_in6.sin6_addr = ip6->ip6_src;
|
|
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
|
|
udp_in6.sin6_addr.s6_addr16[1] = 0;
|
|
if (m->m_pkthdr.rcvif) {
|
|
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
|
|
udp_in6.sin6_scope_id = m->m_pkthdr.rcvif->if_index;
|
|
else
|
|
udp_in6.sin6_scope_id = 0;
|
|
} else
|
|
udp_in6.sin6_scope_id = 0;
|
|
if (in6p->in6p_flags & IN6P_CONTROLOPTS
|
|
|| in6p->in6p_socket->so_options & SO_TIMESTAMP) {
|
|
ip6_savecontrol(in6p, &opts, ip6, m);
|
|
}
|
|
|
|
m_adj(m, off + sizeof(struct udphdr));
|
|
if (sbappendaddr(&in6p->in6p_socket->so_rcv,
|
|
(struct sockaddr *)&udp_in6,
|
|
m, opts) == 0) {
|
|
udp6stat.udp6s_fullsock++;
|
|
goto bad;
|
|
}
|
|
sorwakeup(in6p->in6p_socket);
|
|
return IPPROTO_DONE;
|
|
bad:
|
|
if (m)
|
|
m_freem(m);
|
|
if (opts)
|
|
m_freem(opts);
|
|
return IPPROTO_DONE;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* Notify a udp user of an asynchronous error;
|
|
* just wake up so tat he can collect error status.
|
|
*/
|
|
static void
|
|
udp6_notify(in6p, errno)
|
|
register struct in6pcb *in6p;
|
|
int errno;
|
|
{
|
|
in6p->in6p_socket->so_error = errno;
|
|
sorwakeup(in6p->in6p_socket);
|
|
sowwakeup(in6p->in6p_socket);
|
|
}
|
|
|
|
void
|
|
udp6_ctlinput(cmd, sa, d)
|
|
int cmd;
|
|
struct sockaddr *sa;
|
|
void *d;
|
|
{
|
|
register struct udphdr *uhp;
|
|
struct udphdr uh;
|
|
struct sockaddr_in6 sa6;
|
|
register struct ip6_hdr *ip6;
|
|
struct mbuf *m;
|
|
int off;
|
|
|
|
if (sa->sa_family != AF_INET6 ||
|
|
sa->sa_len != sizeof(struct sockaddr_in6))
|
|
return;
|
|
|
|
#if 0
|
|
if (cmd == PRC_IFNEWADDR)
|
|
in6_mrejoin(&udb6);
|
|
else
|
|
#endif
|
|
if (!PRC_IS_REDIRECT(cmd) &&
|
|
((unsigned)cmd >= PRC_NCMDS || inet6ctlerrmap[cmd] == 0))
|
|
return;
|
|
|
|
/* if the parameter is from icmp6, decode it. */
|
|
if (d != NULL) {
|
|
struct ip6ctlparam *ip6cp = (struct ip6ctlparam *)d;
|
|
m = ip6cp->ip6c_m;
|
|
ip6 = ip6cp->ip6c_ip6;
|
|
off = ip6cp->ip6c_off;
|
|
} else {
|
|
m = NULL;
|
|
ip6 = NULL;
|
|
}
|
|
|
|
/* translate addresses into internal form */
|
|
sa6 = *(struct sockaddr_in6 *)sa;
|
|
if (IN6_IS_ADDR_LINKLOCAL(&sa6.sin6_addr))
|
|
sa6.sin6_addr.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
|
|
|
|
if (ip6) {
|
|
/*
|
|
* XXX: We assume that when IPV6 is non NULL,
|
|
* M and OFF are valid.
|
|
*/
|
|
struct in6_addr s;
|
|
|
|
/* translate addresses into internal form */
|
|
memcpy(&s, &ip6->ip6_src, sizeof(s));
|
|
if (IN6_IS_ADDR_LINKLOCAL(&s))
|
|
s.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
|
|
|
|
if (m->m_len < off + sizeof(uh)) {
|
|
/*
|
|
* this should be rare case,
|
|
* so we compromise on this copy...
|
|
*/
|
|
m_copydata(m, off, sizeof(uh), (caddr_t)&uh);
|
|
uhp = &uh;
|
|
} else
|
|
uhp = (struct udphdr *)(mtod(m, caddr_t) + off);
|
|
(void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6,
|
|
uhp->uh_dport, &s,
|
|
uhp->uh_sport, cmd, udp6_notify);
|
|
} else {
|
|
(void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6, 0,
|
|
&zeroin6_addr, 0, cmd, udp6_notify);
|
|
}
|
|
}
|
|
|
|
int
|
|
udp6_output(in6p, m, addr6, control)
|
|
register struct in6pcb *in6p;
|
|
register struct mbuf *m;
|
|
struct mbuf *addr6, *control;
|
|
{
|
|
register u_int32_t ulen = m->m_pkthdr.len;
|
|
u_int32_t plen = sizeof(struct udphdr) + ulen;
|
|
struct ip6_hdr *ip6;
|
|
struct udphdr *udp6;
|
|
struct in6_addr *laddr, *faddr;
|
|
u_short fport;
|
|
int error = 0;
|
|
struct ip6_pktopts opt, *stickyopt = in6p->in6p_outputopts;
|
|
int priv;
|
|
struct proc *p = curproc; /* XXX */
|
|
int af, hlen;
|
|
#ifdef INET
|
|
struct ip *ip;
|
|
#endif
|
|
|
|
priv = 0;
|
|
if (p && !suser(p->p_ucred, &p->p_acflag))
|
|
priv = 1;
|
|
if (control) {
|
|
if ((error = ip6_setpktoptions(control, &opt, priv)) != 0)
|
|
goto release;
|
|
in6p->in6p_outputopts = &opt;
|
|
}
|
|
|
|
if (addr6) {
|
|
/*
|
|
* IPv4 version of udp_output calls in_pcbconnect in this case,
|
|
* which needs splnet and affects performance.
|
|
* Since we saw no essential reason for calling in_pcbconnect,
|
|
* we get rid of such kind of logic, and call in6_selectsrc
|
|
* and In6_pcbsetport in order to fill in the local address
|
|
* and the local port.
|
|
*/
|
|
struct sockaddr_in6 *sin6 = mtod(addr6, struct sockaddr_in6 *);
|
|
|
|
if (addr6->m_len != sizeof(*sin6)) {
|
|
error = EINVAL;
|
|
goto release;
|
|
}
|
|
if (sin6->sin6_family != AF_INET6) {
|
|
error = EAFNOSUPPORT;
|
|
goto release;
|
|
}
|
|
if (sin6->sin6_port == 0) {
|
|
error = EADDRNOTAVAIL;
|
|
goto release;
|
|
}
|
|
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
error = EISCONN;
|
|
goto release;
|
|
}
|
|
|
|
faddr = &sin6->sin6_addr;
|
|
fport = sin6->sin6_port; /* allow 0 port */
|
|
/*
|
|
* If the scope of the destination is link-local,
|
|
* embed the interface
|
|
* index in the address.
|
|
*
|
|
* XXX advanced-api value overrides sin6_scope_id
|
|
*/
|
|
if (IN6_IS_ADDR_LINKLOCAL(faddr) ||
|
|
IN6_IS_ADDR_MC_LINKLOCAL(faddr)) {
|
|
struct ip6_pktopts *optp = in6p->in6p_outputopts;
|
|
struct in6_pktinfo *pi = NULL;
|
|
struct ifnet *oifp = NULL;
|
|
struct ip6_moptions *mopt = NULL;
|
|
|
|
/*
|
|
* XXX Boundary check is assumed to be already done in
|
|
* ip6_setpktoptions().
|
|
*/
|
|
if (optp && (pi = optp->ip6po_pktinfo) &&
|
|
pi->ipi6_ifindex) {
|
|
faddr->s6_addr16[1] = htons(pi->ipi6_ifindex);
|
|
oifp = ifindex2ifnet[pi->ipi6_ifindex];
|
|
}
|
|
else if (IN6_IS_ADDR_MULTICAST(faddr) &&
|
|
(mopt = in6p->in6p_moptions) &&
|
|
mopt->im6o_multicast_ifp) {
|
|
oifp = mopt->im6o_multicast_ifp;
|
|
faddr->s6_addr16[1] = oifp->if_index;
|
|
} else if (sin6->sin6_scope_id) {
|
|
/* boundary check */
|
|
if (sin6->sin6_scope_id < 0
|
|
|| if_index < sin6->sin6_scope_id) {
|
|
error = ENXIO; /* XXX EINVAL? */
|
|
goto release;
|
|
}
|
|
/* XXX */
|
|
faddr->s6_addr16[1] =
|
|
htons(sin6->sin6_scope_id & 0xffff);
|
|
}
|
|
}
|
|
|
|
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
|
|
laddr = in6_selectsrc(sin6, in6p->in6p_outputopts,
|
|
in6p->in6p_moptions,
|
|
&in6p->in6p_route,
|
|
&in6p->in6p_laddr, &error);
|
|
} else
|
|
laddr = &in6p->in6p_laddr; /*XXX*/
|
|
if (laddr == NULL) {
|
|
if (error == 0)
|
|
error = EADDRNOTAVAIL;
|
|
goto release;
|
|
}
|
|
if (in6p->in6p_lport == 0 &&
|
|
(error = in6_pcbsetport(laddr, in6p)) != 0)
|
|
goto release;
|
|
} else {
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
error = ENOTCONN;
|
|
goto release;
|
|
}
|
|
laddr = &in6p->in6p_laddr;
|
|
faddr = &in6p->in6p_faddr;
|
|
fport = in6p->in6p_fport;
|
|
}
|
|
|
|
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
|
|
af = AF_INET6;
|
|
hlen = sizeof(struct ip6_hdr);
|
|
} else {
|
|
af = AF_INET;
|
|
hlen = sizeof(struct ip);
|
|
}
|
|
|
|
/*
|
|
* Calculate data length and get a mbuf
|
|
* for UDP and IP6 headers.
|
|
*/
|
|
M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT);
|
|
if (m == 0) {
|
|
error = ENOBUFS;
|
|
goto release;
|
|
}
|
|
|
|
/*
|
|
* Stuff checksum and output datagram.
|
|
*/
|
|
udp6 = (struct udphdr *)(mtod(m, caddr_t) + hlen);
|
|
udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */
|
|
udp6->uh_dport = fport;
|
|
if (plen <= 0xffff)
|
|
udp6->uh_ulen = htons((u_short)plen);
|
|
else
|
|
udp6->uh_ulen = 0;
|
|
udp6->uh_sum = 0;
|
|
|
|
switch (af) {
|
|
case AF_INET6:
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK;
|
|
ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
|
|
ip6->ip6_vfc |= IPV6_VERSION;
|
|
#if 0 /* ip6_plen will be filled in ip6_output. */
|
|
ip6->ip6_plen = htons((u_short)plen);
|
|
#endif
|
|
ip6->ip6_nxt = IPPROTO_UDP;
|
|
ip6->ip6_hlim = in6_selecthlim(in6p,
|
|
in6p->in6p_route.ro_rt ?
|
|
in6p->in6p_route.ro_rt->rt_ifp : NULL);
|
|
ip6->ip6_src = *laddr;
|
|
ip6->ip6_dst = *faddr;
|
|
|
|
if ((udp6->uh_sum = in6_cksum(m, IPPROTO_UDP,
|
|
sizeof(struct ip6_hdr), plen)) == 0) {
|
|
udp6->uh_sum = 0xffff;
|
|
}
|
|
|
|
udp6stat.udp6s_opackets++;
|
|
#ifdef IPSEC
|
|
m->m_pkthdr.rcvif = (struct ifnet *)in6p->in6p_socket;
|
|
#endif /*IPSEC*/
|
|
error = ip6_output(m, in6p->in6p_outputopts, &in6p->in6p_route,
|
|
0, in6p->in6p_moptions, NULL);
|
|
break;
|
|
case AF_INET:
|
|
#ifdef INET
|
|
/* can't transmit jumbogram over IPv4 */
|
|
if (plen > 0xffff) {
|
|
error = EMSGSIZE;
|
|
goto release;
|
|
}
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
ip->ip_len = plen;
|
|
ip->ip_p = IPPROTO_UDP;
|
|
ip->ip_ttl = in6p->in6p_hops; /*XXX*/
|
|
ip->ip_tos = 0; /*XXX*/
|
|
bcopy(&laddr->s6_addr[12], &ip->ip_src, sizeof(ip->ip_src));
|
|
bcopy(&faddr->s6_addr[12], &ip->ip_dst, sizeof(ip->ip_dst));
|
|
|
|
udp6->uh_sum = 0;
|
|
if ((udp6->uh_sum = in_cksum(m, ulen)) == 0)
|
|
udp6->uh_sum = 0xffff;
|
|
|
|
udpstat.udps_opackets++;
|
|
#ifdef IPSEC
|
|
m->m_pkthdr.rcvif = NULL; /*XXX*/
|
|
#endif /*IPSEC*/
|
|
error = ip_output(m, NULL, &in6p->in6p_route, 0 /*XXX*/);
|
|
break;
|
|
#else
|
|
error = EAFNOSUPPORT;
|
|
goto release;
|
|
#endif
|
|
}
|
|
goto releaseopt;
|
|
|
|
release:
|
|
m_freem(m);
|
|
|
|
releaseopt:
|
|
if (control) {
|
|
in6p->in6p_outputopts = stickyopt;
|
|
m_freem(control);
|
|
}
|
|
return(error);
|
|
}
|
|
|
|
extern int udp6_sendspace;
|
|
extern int udp6_recvspace;
|
|
|
|
int
|
|
udp6_usrreq(so, req, m, addr6, control, p)
|
|
struct socket *so;
|
|
int req;
|
|
struct mbuf *m, *addr6, *control;
|
|
struct proc *p;
|
|
{
|
|
struct in6pcb *in6p = sotoin6pcb(so);
|
|
int error = 0;
|
|
int s;
|
|
|
|
/*
|
|
* MAPPED_ADDR implementation info:
|
|
* Mapped addr support for PRU_CONTROL is not necessary.
|
|
* Because typical user of PRU_CONTROL is such as ifconfig,
|
|
* and they don't associate any addr to their socket. Then
|
|
* socket family is only hint about the PRU_CONTROL'ed address
|
|
* family, especially when getting addrs from kernel.
|
|
* So AF_INET socket need to be used to control AF_INET addrs,
|
|
* and AF_INET6 socket for AF_INET6 addrs.
|
|
*/
|
|
if (req == PRU_CONTROL)
|
|
return(in6_control(so, (u_long)m, (caddr_t)addr6,
|
|
(struct ifnet *)control, p));
|
|
|
|
if (req == PRU_PURGEADDR) {
|
|
in6_purgeaddr((struct ifaddr *)addr6, (struct ifnet *)control);
|
|
return (0);
|
|
}
|
|
|
|
if (in6p == NULL && req != PRU_ATTACH) {
|
|
error = EINVAL;
|
|
goto release;
|
|
}
|
|
|
|
switch (req) {
|
|
case PRU_ATTACH:
|
|
/*
|
|
* MAPPED_ADDR implementation spec:
|
|
* Always attach for IPv6,
|
|
* and only when necessary for IPv4.
|
|
*/
|
|
if (in6p != NULL) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
s = splsoftnet();
|
|
error = in6_pcballoc(so, &udb6);
|
|
splx(s);
|
|
if (error)
|
|
break;
|
|
error = soreserve(so, udp6_sendspace, udp6_recvspace);
|
|
if (error)
|
|
break;
|
|
in6p = sotoin6pcb(so);
|
|
in6p->in6p_cksum = -1; /* just to be sure */
|
|
#ifdef IPSEC
|
|
error = ipsec_init_policy(so, &in6p->in6p_sp);
|
|
if (error != 0) {
|
|
in6_pcbdetach(in6p);
|
|
break;
|
|
}
|
|
#endif /*IPSEC*/
|
|
break;
|
|
|
|
case PRU_DETACH:
|
|
udp6_detach(in6p);
|
|
break;
|
|
|
|
case PRU_BIND:
|
|
s = splsoftnet();
|
|
error = in6_pcbbind(in6p, addr6);
|
|
splx(s);
|
|
break;
|
|
|
|
case PRU_LISTEN:
|
|
error = EOPNOTSUPP;
|
|
break;
|
|
|
|
case PRU_CONNECT:
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
error = EISCONN;
|
|
break;
|
|
}
|
|
s = splsoftnet();
|
|
error = in6_pcbconnect(in6p, addr6);
|
|
if (ip6_auto_flowlabel) {
|
|
in6p->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
|
|
in6p->in6p_flowinfo |=
|
|
(htonl(ip6_flow_seq++) & IPV6_FLOWLABEL_MASK);
|
|
}
|
|
splx(s);
|
|
if (error == 0)
|
|
soisconnected(so);
|
|
break;
|
|
|
|
case PRU_CONNECT2:
|
|
error = EOPNOTSUPP;
|
|
break;
|
|
|
|
case PRU_ACCEPT:
|
|
error = EOPNOTSUPP;
|
|
break;
|
|
|
|
case PRU_DISCONNECT:
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
|
|
error = ENOTCONN;
|
|
break;
|
|
}
|
|
s = splsoftnet();
|
|
in6_pcbdisconnect(in6p);
|
|
bzero((caddr_t)&in6p->in6p_laddr, sizeof(in6p->in6p_laddr));
|
|
splx(s);
|
|
so->so_state &= ~SS_ISCONNECTED; /* XXX */
|
|
break;
|
|
|
|
case PRU_SHUTDOWN:
|
|
socantsendmore(so);
|
|
break;
|
|
|
|
case PRU_SEND:
|
|
return(udp6_output(in6p, m, addr6, control));
|
|
|
|
case PRU_ABORT:
|
|
soisdisconnected(so);
|
|
udp6_detach(in6p);
|
|
break;
|
|
|
|
case PRU_SOCKADDR:
|
|
in6_setsockaddr(in6p, addr6);
|
|
break;
|
|
|
|
case PRU_PEERADDR:
|
|
in6_setpeeraddr(in6p, addr6);
|
|
break;
|
|
|
|
case PRU_SENSE:
|
|
/*
|
|
* stat: don't bother with a blocksize
|
|
*/
|
|
return(0);
|
|
|
|
case PRU_SENDOOB:
|
|
case PRU_FASTTIMO:
|
|
case PRU_SLOWTIMO:
|
|
case PRU_PROTORCV:
|
|
case PRU_PROTOSEND:
|
|
error = EOPNOTSUPP;
|
|
break;
|
|
|
|
case PRU_RCVD:
|
|
case PRU_RCVOOB:
|
|
return(EOPNOTSUPP); /* do not free mbuf's */
|
|
|
|
default:
|
|
panic("udp6_usrreq");
|
|
}
|
|
|
|
release:
|
|
if (control) {
|
|
printf("udp control data unexpectedly retained\n");
|
|
m_freem(control);
|
|
}
|
|
if (m)
|
|
m_freem(m);
|
|
return(error);
|
|
}
|
|
|
|
static void
|
|
udp6_detach(in6p)
|
|
struct in6pcb *in6p;
|
|
{
|
|
int s = splsoftnet();
|
|
|
|
if (in6p == udp6_last_in6pcb)
|
|
udp6_last_in6pcb = &udb6;
|
|
in6_pcbdetach(in6p);
|
|
splx(s);
|
|
}
|
|
|
|
#include <vm/vm.h>
|
|
#include <sys/sysctl.h>
|
|
|
|
int
|
|
udp6_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
|
|
int *name;
|
|
u_int namelen;
|
|
void *oldp;
|
|
size_t *oldlenp;
|
|
void *newp;
|
|
size_t newlen;
|
|
{
|
|
/* All sysctl names at this level are terminal. */
|
|
if (namelen != 1)
|
|
return ENOTDIR;
|
|
|
|
switch (name[0]) {
|
|
|
|
case UDP6CTL_SENDMAX:
|
|
return sysctl_int(oldp, oldlenp, newp, newlen,
|
|
&udp6_sendspace);
|
|
case UDP6CTL_RECVSPACE:
|
|
return sysctl_int(oldp, oldlenp, newp, newlen,
|
|
&udp6_recvspace);
|
|
default:
|
|
return ENOPROTOOPT;
|
|
}
|
|
/* NOTREACHED */
|
|
}
|