NetBSD/sys/netinet6/udp6_usrreq.c
itojun 04ac848d6f introduce m->m_pkthdr.aux to hold random data which needs to be passed
between protocol handlers.

ipsec socket pointers, ipsec decryption/auth information, tunnel
decapsulation information are in my mind - there can be several other usage.
at this moment, we use this for ipsec socket pointer passing.  this will
avoid reuse of m->m_pkthdr.rcvif in ipsec code.

due to the change, MHLEN will be decreased by sizeof(void *) - for example,
for i386, MHLEN was 100 bytes, but is now 96 bytes.
we may want to increase MSIZE from 128 to 256 for some of our architectures.

take caution if you use it for keeping some data item for long period
of time - use extra caution on M_PREPEND() or m_adj(), as they may result
in loss of m->m_pkthdr.aux pointer (and mbuf leak).

this will bump kernel version.

(as discussed in tech-net, tested in kame tree)
2000-03-01 12:49:27 +00:00

988 lines
25 KiB
C

/* $NetBSD: udp6_usrreq.c,v 1.26 2000/03/01 12:49:50 itojun Exp $ */
/* $KAME: udp6_usrreq.c,v 1.40 2000/02/28 15:44:13 itojun Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/*
* Copyright (c) 1982, 1986, 1989, 1993
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)udp_var.h 8.1 (Berkeley) 6/10/93
*/
#include "opt_ipsec.h"
#include <sys/param.h>
#include <sys/malloc.h>
#include <sys/mbuf.h>
#include <sys/protosw.h>
#include <sys/socket.h>
#include <sys/socketvar.h>
#include <sys/errno.h>
#include <sys/stat.h>
#include <sys/systm.h>
#include <sys/proc.h>
#include <sys/syslog.h>
#include <net/if.h>
#include <net/route.h>
#include <net/if_types.h>
#include <netinet/in.h>
#include <netinet/in_var.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/ip_var.h>
#include <netinet/in_pcb.h>
#include <netinet/udp.h>
#include <netinet/udp_var.h>
#include <netinet/ip6.h>
#include <netinet6/in6_pcb.h>
#include <netinet6/ip6_var.h>
#include <netinet/icmp6.h>
#include <netinet6/udp6_var.h>
#include <netinet6/ip6protosw.h>
#ifdef IPSEC
#include <netinet6/ipsec.h>
#endif /*IPSEC*/
#include "faith.h"
/*
* UDP protocol inplementation.
* Per RFC 768, August, 1980.
*/
struct in6pcb *udp6_last_in6pcb = &udb6;
#ifdef UDP6
static int in6_mcmatch __P((struct in6pcb *, struct in6_addr *, struct ifnet *));
#endif
static void udp6_detach __P((struct in6pcb *));
static void udp6_notify __P((struct in6pcb *, int));
void
udp6_init()
{
udb6.in6p_next = udb6.in6p_prev = &udb6;
}
#ifdef UDP6
static int
in6_mcmatch(in6p, ia6, ifp)
struct in6pcb *in6p;
register struct in6_addr *ia6;
struct ifnet *ifp;
{
struct ip6_moptions *im6o = in6p->in6p_moptions;
struct in6_multi_mship *imm;
if (im6o == NULL)
return 0;
for (imm = im6o->im6o_memberships.lh_first; imm != NULL;
imm = imm->i6mm_chain.le_next) {
if ((ifp == NULL ||
imm->i6mm_maddr->in6m_ifp == ifp) &&
IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
ia6))
return 1;
}
return 0;
}
int
udp6_input(mp, offp, proto)
struct mbuf **mp;
int *offp, proto;
{
struct mbuf *m = *mp;
register struct ip6_hdr *ip6;
register struct udphdr *uh;
register struct in6pcb *in6p;
struct mbuf *opts = 0;
int off = *offp;
u_int32_t plen, ulen;
struct sockaddr_in6 udp_in6;
#if defined(NFAITH) && 0 < NFAITH
if (m->m_pkthdr.rcvif) {
if (m->m_pkthdr.rcvif->if_type == IFT_FAITH) {
/* send icmp6 host unreach? */
m_freem(m);
return IPPROTO_DONE;
}
}
#endif
udp6stat.udp6s_ipackets++;
ip6 = mtod(m, struct ip6_hdr *);
/* check for jumbogram is done in ip6_input. we can trust pkthdr.len */
plen = m->m_pkthdr.len - off;
#ifndef PULLDOWN_TEST
IP6_EXTHDR_CHECK(m, off, sizeof(struct udphdr), IPPROTO_DONE);
uh = (struct udphdr *)((caddr_t)ip6 + off);
#else
IP6_EXTHDR_GET(uh, struct udphdr *, m, off, sizeof(struct udphdr));
if (uh == NULL) {
udp6stat.udp6s_hdrops++;
return IPPROTO_DONE;
}
#endif
ulen = ntohs((u_short)uh->uh_ulen);
if (ulen == 0 && plen > 0xffff) /* jumbogram */
ulen = plen;
if (plen != ulen) {
udp6stat.udp6s_badlen++;
goto bad;
}
/* destination port of 0 is illegal, based on RFC768. */
if (uh->uh_dport == 0)
goto bad;
/* Be proactive about malicious use of IPv4 mapped address */
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
/* XXX stat */
goto bad;
}
/*
* Checksum extended UDP header and data.
*/
if (uh->uh_sum == 0)
udp6stat.udp6s_nosum++;
else if (in6_cksum(m, IPPROTO_UDP, off, ulen) != 0) {
udp6stat.udp6s_badsum++;
goto bad;
}
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
struct in6pcb *last;
/*
* Deliver a multicast datagram to all sockets
* for which the local and remote addresses and ports match
* those of the incoming datagram. This allows more than
* one process to receive multicasts on the same port.
* (This really ought to be done for unicast datagrams as
* well, but that would cause problems with existing
* applications that open both address-specific sockets and
* a wildcard socket listening to the same port -- they would
* end up receiving duplicates of every unicast datagram.
* Those applications open the multiple sockets to overcome an
* inadequacy of the UDP socket interface, but for backwards
* compatibility we avoid the problem here rather than
* fixing the interface. Maybe 4.5BSD will remedy this?)
*/
/*
* In a case that laddr should be set to the link-local
* address (this happens in RIPng), the multicast address
* specified in the received packet does not match with
* laddr. To cure this situation, the matching is relaxed
* if the receiving interface is the same as one specified
* in the socket and if the destination multicast address
* matches one of the multicast groups specified in the socket.
*/
/*
* Construct sockaddr format source address.
*/
bzero(&udp_in6, sizeof(udp_in6));
udp_in6.sin6_len = sizeof(struct sockaddr_in6);
udp_in6.sin6_family = AF_INET6;
udp_in6.sin6_port = uh->uh_sport;
udp_in6.sin6_addr = ip6->ip6_src;
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
udp_in6.sin6_addr.s6_addr16[1] = 0;
if (m->m_pkthdr.rcvif) {
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr)) {
udp_in6.sin6_scope_id =
m->m_pkthdr.rcvif->if_index;
} else
udp_in6.sin6_scope_id = 0;
} else
udp_in6.sin6_scope_id = 0;
/*
* KAME note: usually we drop udphdr from mbuf here.
* We need udphdr for IPsec processing so we do that later.
*/
/*
* Locate pcb(s) for datagram.
* (Algorithm copied from raw_intr().)
*/
last = NULL;
for (in6p = udb6.in6p_next;
in6p != &udb6;
in6p = in6p->in6p_next) {
if (in6p->in6p_lport != uh->uh_dport)
continue;
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) {
if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr,
&ip6->ip6_dst) &&
!in6_mcmatch(in6p, &ip6->ip6_dst,
m->m_pkthdr.rcvif))
continue;
}
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
if (!IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr,
&ip6->ip6_src) ||
in6p->in6p_fport != uh->uh_sport)
continue;
}
if (last != NULL) {
struct mbuf *n;
#ifdef IPSEC
/*
* Check AH/ESP integrity.
*/
if (ipsec6_in_reject(m, last)) {
ipsec6stat.in_polvio++;
/* do not inject data into pcb */
} else
#endif /*IPSEC*/
if ((n = m_copy(m, 0, M_COPYALL)) != NULL) {
/*
* KAME NOTE: do not
* m_copy(m, offset, ...) above.
* sbappendaddr() expects M_PKTHDR,
* and m_copy() will copy M_PKTHDR
* only if offset is 0.
*/
if (last->in6p_flags & IN6P_CONTROLOPTS
|| last->in6p_socket->so_options & SO_TIMESTAMP) {
ip6_savecontrol(last, &opts,
ip6, n);
}
m_adj(n, off + sizeof(struct udphdr));
if (sbappendaddr(&last->in6p_socket->so_rcv,
(struct sockaddr *)&udp_in6,
n, opts) == 0) {
m_freem(n);
if (opts)
m_freem(opts);
udp6stat.udp6s_fullsock++;
} else
sorwakeup(last->in6p_socket);
opts = 0;
}
}
last = in6p;
/*
* Don't look for additional matches if this one does
* not have either the SO_REUSEPORT or SO_REUSEADDR
* socket options set. This heuristic avoids searching
* through all pcbs in the common case of a non-shared
* port. It assumes that an application will never
* clear these options after setting them.
*/
if ((last->in6p_socket->so_options &
(SO_REUSEPORT|SO_REUSEADDR)) == 0)
break;
}
if (last == NULL) {
/*
* No matching pcb found; discard datagram.
* (No need to send an ICMP Port Unreachable
* for a broadcast or multicast datgram.)
*/
udp6stat.udp6s_noport++;
udp6stat.udp6s_noportmcast++;
goto bad;
}
#ifdef IPSEC
/*
* Check AH/ESP integrity.
*/
if (last != NULL && ipsec6_in_reject(m, last)) {
ipsec6stat.in_polvio++;
goto bad;
}
#endif /*IPSEC*/
if (last->in6p_flags & IN6P_CONTROLOPTS
|| last->in6p_socket->so_options & SO_TIMESTAMP) {
ip6_savecontrol(last, &opts, ip6, m);
}
m_adj(m, off + sizeof(struct udphdr));
if (sbappendaddr(&last->in6p_socket->so_rcv,
(struct sockaddr *)&udp_in6,
m, opts) == 0) {
udp6stat.udp6s_fullsock++;
goto bad;
}
sorwakeup(last->in6p_socket);
return IPPROTO_DONE;
}
/*
* Locate pcb for datagram.
*/
in6p = udp6_last_in6pcb;
if (in6p->in6p_lport != uh->uh_dport ||
in6p->in6p_fport != uh->uh_sport ||
!IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src) ||
!IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst)) {
in6p = in6_pcblookup(&udb6,
&ip6->ip6_src, uh->uh_sport,
&ip6->ip6_dst, uh->uh_dport,
IN6PLOOKUP_WILDCARD);
if (in6p)
udp6_last_in6pcb = in6p;
udp6stat.udp6ps_pcbcachemiss++;
}
if (in6p == 0) {
udp6stat.udp6s_noport++;
if (m->m_flags & M_MCAST) {
printf("UDP6: M_MCAST is set in a unicast packet.\n");
udp6stat.udp6s_noportmcast++;
goto bad;
}
icmp6_error(m, ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOPORT, 0);
return IPPROTO_DONE;
}
#ifdef IPSEC
/*
* Check AH/ESP integrity.
*/
if (in6p != NULL && ipsec6_in_reject(m, in6p)) {
ipsec6stat.in_polvio++;
goto bad;
}
#endif /*IPSEC*/
/*
* Construct sockaddr format source address.
* Stuff source address and datagram in user buffer.
*/
bzero(&udp_in6, sizeof(udp_in6));
udp_in6.sin6_len = sizeof(struct sockaddr_in6);
udp_in6.sin6_family = AF_INET6;
udp_in6.sin6_port = uh->uh_sport;
udp_in6.sin6_addr = ip6->ip6_src;
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
udp_in6.sin6_addr.s6_addr16[1] = 0;
if (m->m_pkthdr.rcvif) {
if (IN6_IS_SCOPE_LINKLOCAL(&udp_in6.sin6_addr))
udp_in6.sin6_scope_id = m->m_pkthdr.rcvif->if_index;
else
udp_in6.sin6_scope_id = 0;
} else
udp_in6.sin6_scope_id = 0;
if (in6p->in6p_flags & IN6P_CONTROLOPTS
|| in6p->in6p_socket->so_options & SO_TIMESTAMP) {
ip6_savecontrol(in6p, &opts, ip6, m);
}
m_adj(m, off + sizeof(struct udphdr));
if (sbappendaddr(&in6p->in6p_socket->so_rcv,
(struct sockaddr *)&udp_in6,
m, opts) == 0) {
udp6stat.udp6s_fullsock++;
goto bad;
}
sorwakeup(in6p->in6p_socket);
return IPPROTO_DONE;
bad:
if (m)
m_freem(m);
if (opts)
m_freem(opts);
return IPPROTO_DONE;
}
#endif
/*
* Notify a udp user of an asynchronous error;
* just wake up so tat he can collect error status.
*/
static void
udp6_notify(in6p, errno)
register struct in6pcb *in6p;
int errno;
{
in6p->in6p_socket->so_error = errno;
sorwakeup(in6p->in6p_socket);
sowwakeup(in6p->in6p_socket);
}
void
udp6_ctlinput(cmd, sa, d)
int cmd;
struct sockaddr *sa;
void *d;
{
register struct udphdr *uhp;
struct udphdr uh;
struct sockaddr_in6 sa6;
register struct ip6_hdr *ip6;
struct mbuf *m;
int off;
void (*notify) __P((struct in6pcb *, int)) = udp6_notify;
if (sa->sa_family != AF_INET6 ||
sa->sa_len != sizeof(struct sockaddr_in6))
return;
if ((unsigned)cmd >= PRC_NCMDS)
return;
if (PRC_IS_REDIRECT(cmd))
notify = in6_rtchange, d = NULL;
else if (cmd == PRC_HOSTDEAD)
d = NULL;
else if (inet6ctlerrmap[cmd] == 0)
return;
/* if the parameter is from icmp6, decode it. */
if (d != NULL) {
struct ip6ctlparam *ip6cp = (struct ip6ctlparam *)d;
m = ip6cp->ip6c_m;
ip6 = ip6cp->ip6c_ip6;
off = ip6cp->ip6c_off;
} else {
m = NULL;
ip6 = NULL;
}
/* translate addresses into internal form */
sa6 = *(struct sockaddr_in6 *)sa;
if (IN6_IS_ADDR_LINKLOCAL(&sa6.sin6_addr) && m && m->m_pkthdr.rcvif)
sa6.sin6_addr.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
if (ip6) {
/*
* XXX: We assume that when IPV6 is non NULL,
* M and OFF are valid.
*/
struct in6_addr s;
/* translate addresses into internal form */
memcpy(&s, &ip6->ip6_src, sizeof(s));
if (IN6_IS_ADDR_LINKLOCAL(&s))
s.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
if (m->m_len < off + sizeof(uh)) {
/*
* this should be rare case,
* so we compromise on this copy...
*/
m_copydata(m, off, sizeof(uh), (caddr_t)&uh);
uhp = &uh;
} else
uhp = (struct udphdr *)(mtod(m, caddr_t) + off);
(void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6,
uhp->uh_dport, &s,
uhp->uh_sport, cmd, notify);
} else {
(void) in6_pcbnotify(&udb6, (struct sockaddr *)&sa6, 0,
&zeroin6_addr, 0, cmd, notify);
}
}
int
udp6_output(in6p, m, addr6, control)
register struct in6pcb *in6p;
register struct mbuf *m;
struct mbuf *addr6, *control;
{
register u_int32_t ulen = m->m_pkthdr.len;
u_int32_t plen = sizeof(struct udphdr) + ulen;
struct ip6_hdr *ip6;
struct udphdr *udp6;
struct in6_addr *laddr, *faddr;
u_short fport;
int error = 0;
struct ip6_pktopts opt, *stickyopt = in6p->in6p_outputopts;
int priv;
struct proc *p = curproc; /* XXX */
int af, hlen;
#ifdef INET
struct ip *ip;
#endif
priv = 0;
if (p && !suser(p->p_ucred, &p->p_acflag))
priv = 1;
if (control) {
if ((error = ip6_setpktoptions(control, &opt, priv)) != 0)
goto release;
in6p->in6p_outputopts = &opt;
}
if (addr6) {
/*
* IPv4 version of udp_output calls in_pcbconnect in this case,
* which needs splnet and affects performance.
* Since we saw no essential reason for calling in_pcbconnect,
* we get rid of such kind of logic, and call in6_selectsrc
* and In6_pcbsetport in order to fill in the local address
* and the local port.
*/
struct sockaddr_in6 *sin6 = mtod(addr6, struct sockaddr_in6 *);
if (addr6->m_len != sizeof(*sin6)) {
error = EINVAL;
goto release;
}
if (sin6->sin6_family != AF_INET6) {
error = EAFNOSUPPORT;
goto release;
}
if (sin6->sin6_port == 0) {
error = EADDRNOTAVAIL;
goto release;
}
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
error = EISCONN;
goto release;
}
faddr = &sin6->sin6_addr;
fport = sin6->sin6_port; /* allow 0 port */
/*
* If the scope of the destination is link-local,
* embed the interface
* index in the address.
*
* XXX advanced-api value overrides sin6_scope_id
*/
if (IN6_IS_ADDR_LINKLOCAL(faddr) ||
IN6_IS_ADDR_MC_LINKLOCAL(faddr)) {
struct ip6_pktopts *optp = in6p->in6p_outputopts;
struct in6_pktinfo *pi = NULL;
struct ifnet *oifp = NULL;
struct ip6_moptions *mopt = NULL;
/*
* XXX Boundary check is assumed to be already done in
* ip6_setpktoptions().
*/
if (optp && (pi = optp->ip6po_pktinfo) &&
pi->ipi6_ifindex) {
faddr->s6_addr16[1] = htons(pi->ipi6_ifindex);
oifp = ifindex2ifnet[pi->ipi6_ifindex];
}
else if (IN6_IS_ADDR_MULTICAST(faddr) &&
(mopt = in6p->in6p_moptions) &&
mopt->im6o_multicast_ifp) {
oifp = mopt->im6o_multicast_ifp;
faddr->s6_addr16[1] = oifp->if_index;
} else if (sin6->sin6_scope_id) {
/* boundary check */
if (sin6->sin6_scope_id < 0
|| if_index < sin6->sin6_scope_id) {
error = ENXIO; /* XXX EINVAL? */
goto release;
}
/* XXX */
faddr->s6_addr16[1] =
htons(sin6->sin6_scope_id & 0xffff);
}
}
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
laddr = in6_selectsrc(sin6, in6p->in6p_outputopts,
in6p->in6p_moptions,
&in6p->in6p_route,
&in6p->in6p_laddr, &error);
} else
laddr = &in6p->in6p_laddr; /*XXX*/
if (laddr == NULL) {
if (error == 0)
error = EADDRNOTAVAIL;
goto release;
}
if (in6p->in6p_lport == 0 &&
(error = in6_pcbsetport(laddr, in6p)) != 0)
goto release;
} else {
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
error = ENOTCONN;
goto release;
}
laddr = &in6p->in6p_laddr;
faddr = &in6p->in6p_faddr;
fport = in6p->in6p_fport;
}
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
af = AF_INET6;
hlen = sizeof(struct ip6_hdr);
} else {
af = AF_INET;
hlen = sizeof(struct ip);
}
/*
* Calculate data length and get a mbuf
* for UDP and IP6 headers.
*/
M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT);
if (m == 0) {
error = ENOBUFS;
goto release;
}
/*
* Stuff checksum and output datagram.
*/
udp6 = (struct udphdr *)(mtod(m, caddr_t) + hlen);
udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */
udp6->uh_dport = fport;
if (plen <= 0xffff)
udp6->uh_ulen = htons((u_short)plen);
else
udp6->uh_ulen = 0;
udp6->uh_sum = 0;
switch (af) {
case AF_INET6:
ip6 = mtod(m, struct ip6_hdr *);
ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK;
ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
ip6->ip6_vfc |= IPV6_VERSION;
#if 0 /* ip6_plen will be filled in ip6_output. */
ip6->ip6_plen = htons((u_short)plen);
#endif
ip6->ip6_nxt = IPPROTO_UDP;
ip6->ip6_hlim = in6_selecthlim(in6p,
in6p->in6p_route.ro_rt ?
in6p->in6p_route.ro_rt->rt_ifp : NULL);
ip6->ip6_src = *laddr;
ip6->ip6_dst = *faddr;
if ((udp6->uh_sum = in6_cksum(m, IPPROTO_UDP,
sizeof(struct ip6_hdr), plen)) == 0) {
udp6->uh_sum = 0xffff;
}
udp6stat.udp6s_opackets++;
#ifdef IPSEC
ipsec_setsocket(m, in6p->in6p_socket);
#endif /*IPSEC*/
error = ip6_output(m, in6p->in6p_outputopts, &in6p->in6p_route,
0, in6p->in6p_moptions, NULL);
break;
case AF_INET:
#ifdef INET
/* can't transmit jumbogram over IPv4 */
if (plen > 0xffff) {
error = EMSGSIZE;
goto release;
}
ip = mtod(m, struct ip *);
ip->ip_len = plen;
ip->ip_p = IPPROTO_UDP;
ip->ip_ttl = in6p->in6p_hops; /*XXX*/
ip->ip_tos = 0; /*XXX*/
bcopy(&laddr->s6_addr[12], &ip->ip_src, sizeof(ip->ip_src));
bcopy(&faddr->s6_addr[12], &ip->ip_dst, sizeof(ip->ip_dst));
udp6->uh_sum = 0;
if ((udp6->uh_sum = in_cksum(m, ulen)) == 0)
udp6->uh_sum = 0xffff;
udpstat.udps_opackets++;
#ifdef IPSEC
ipsec_setsocket(m, NULL); /*XXX*/
#endif /*IPSEC*/
error = ip_output(m, NULL, &in6p->in6p_route, 0 /*XXX*/);
break;
#else
error = EAFNOSUPPORT;
goto release;
#endif
}
goto releaseopt;
release:
m_freem(m);
releaseopt:
if (control) {
in6p->in6p_outputopts = stickyopt;
m_freem(control);
}
return(error);
}
extern int udp6_sendspace;
extern int udp6_recvspace;
int
udp6_usrreq(so, req, m, addr6, control, p)
struct socket *so;
int req;
struct mbuf *m, *addr6, *control;
struct proc *p;
{
struct in6pcb *in6p = sotoin6pcb(so);
int error = 0;
int s;
/*
* MAPPED_ADDR implementation info:
* Mapped addr support for PRU_CONTROL is not necessary.
* Because typical user of PRU_CONTROL is such as ifconfig,
* and they don't associate any addr to their socket. Then
* socket family is only hint about the PRU_CONTROL'ed address
* family, especially when getting addrs from kernel.
* So AF_INET socket need to be used to control AF_INET addrs,
* and AF_INET6 socket for AF_INET6 addrs.
*/
if (req == PRU_CONTROL)
return(in6_control(so, (u_long)m, (caddr_t)addr6,
(struct ifnet *)control, p));
if (req == PRU_PURGEIF) {
in6_purgeif((struct ifnet *)control);
in6_pcbpurgeif(&udb6, (struct ifnet *)control);
return (0);
}
if (in6p == NULL && req != PRU_ATTACH) {
error = EINVAL;
goto release;
}
switch (req) {
case PRU_ATTACH:
/*
* MAPPED_ADDR implementation spec:
* Always attach for IPv6,
* and only when necessary for IPv4.
*/
if (in6p != NULL) {
error = EINVAL;
break;
}
s = splsoftnet();
error = in6_pcballoc(so, &udb6);
splx(s);
if (error)
break;
error = soreserve(so, udp6_sendspace, udp6_recvspace);
if (error)
break;
in6p = sotoin6pcb(so);
in6p->in6p_cksum = -1; /* just to be sure */
#ifdef IPSEC
error = ipsec_init_policy(so, &in6p->in6p_sp);
if (error != 0) {
in6_pcbdetach(in6p);
break;
}
#endif /*IPSEC*/
break;
case PRU_DETACH:
udp6_detach(in6p);
break;
case PRU_BIND:
s = splsoftnet();
error = in6_pcbbind(in6p, addr6);
splx(s);
break;
case PRU_LISTEN:
error = EOPNOTSUPP;
break;
case PRU_CONNECT:
if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
error = EISCONN;
break;
}
s = splsoftnet();
error = in6_pcbconnect(in6p, addr6);
if (ip6_auto_flowlabel) {
in6p->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
in6p->in6p_flowinfo |=
(htonl(ip6_flow_seq++) & IPV6_FLOWLABEL_MASK);
}
splx(s);
if (error == 0)
soisconnected(so);
break;
case PRU_CONNECT2:
error = EOPNOTSUPP;
break;
case PRU_ACCEPT:
error = EOPNOTSUPP;
break;
case PRU_DISCONNECT:
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
error = ENOTCONN;
break;
}
s = splsoftnet();
in6_pcbdisconnect(in6p);
bzero((caddr_t)&in6p->in6p_laddr, sizeof(in6p->in6p_laddr));
splx(s);
so->so_state &= ~SS_ISCONNECTED; /* XXX */
break;
case PRU_SHUTDOWN:
socantsendmore(so);
break;
case PRU_SEND:
return(udp6_output(in6p, m, addr6, control));
case PRU_ABORT:
soisdisconnected(so);
udp6_detach(in6p);
break;
case PRU_SOCKADDR:
in6_setsockaddr(in6p, addr6);
break;
case PRU_PEERADDR:
in6_setpeeraddr(in6p, addr6);
break;
case PRU_SENSE:
/*
* stat: don't bother with a blocksize
*/
return(0);
case PRU_SENDOOB:
case PRU_FASTTIMO:
case PRU_SLOWTIMO:
case PRU_PROTORCV:
case PRU_PROTOSEND:
error = EOPNOTSUPP;
break;
case PRU_RCVD:
case PRU_RCVOOB:
return(EOPNOTSUPP); /* do not free mbuf's */
default:
panic("udp6_usrreq");
}
release:
if (control) {
printf("udp control data unexpectedly retained\n");
m_freem(control);
}
if (m)
m_freem(m);
return(error);
}
static void
udp6_detach(in6p)
struct in6pcb *in6p;
{
int s = splsoftnet();
if (in6p == udp6_last_in6pcb)
udp6_last_in6pcb = &udb6;
in6_pcbdetach(in6p);
splx(s);
}
#include <vm/vm.h>
#include <sys/sysctl.h>
int
udp6_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
int *name;
u_int namelen;
void *oldp;
size_t *oldlenp;
void *newp;
size_t newlen;
{
/* All sysctl names at this level are terminal. */
if (namelen != 1)
return ENOTDIR;
switch (name[0]) {
case UDP6CTL_SENDMAX:
return sysctl_int(oldp, oldlenp, newp, newlen,
&udp6_sendspace);
case UDP6CTL_RECVSPACE:
return sysctl_int(oldp, oldlenp, newp, newlen,
&udp6_recvspace);
default:
return ENOPROTOOPT;
}
/* NOTREACHED */
}