version 1.146.2.4, 2016/03/19 11:30:33 |
version 1.170, 2018/02/28 11:10:22 |
Line 69 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 69 __KERNEL_RCSID(0, "$NetBSD$"); |
|
|
|
#ifdef _KERNEL_OPT |
#ifdef _KERNEL_OPT |
#include "opt_inet.h" |
#include "opt_inet.h" |
#include "opt_compat_netbsd.h" |
|
#include "opt_ipsec.h" |
#include "opt_ipsec.h" |
#include "opt_mrouting.h" |
#include "opt_mrouting.h" |
|
#include "opt_net_mpsafe.h" |
#endif |
#endif |
|
|
#include <sys/param.h> |
#include <sys/param.h> |
Line 86 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 86 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <sys/kauth.h> |
#include <sys/kauth.h> |
|
|
#include <net/if.h> |
#include <net/if.h> |
#include <net/route.h> |
|
|
|
#include <netinet/in.h> |
#include <netinet/in.h> |
#include <netinet/in_systm.h> |
#include <netinet/in_systm.h> |
Line 105 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 104 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netipsec/ipsec_private.h> |
#include <netipsec/ipsec_private.h> |
#endif /* IPSEC */ |
#endif /* IPSEC */ |
|
|
#ifdef COMPAT_50 |
|
#include <compat/sys/socket.h> |
|
#endif |
|
|
|
struct inpcbtable rawcbtable; |
struct inpcbtable rawcbtable; |
|
|
int rip_pcbnotify(struct inpcbtable *, struct in_addr, |
int rip_pcbnotify(struct inpcbtable *, struct in_addr, |
Line 148 rip_sbappendaddr(struct inpcb *last, str |
|
Line 143 rip_sbappendaddr(struct inpcb *last, str |
|
{ |
{ |
if (last->inp_flags & INP_NOHEADER) |
if (last->inp_flags & INP_NOHEADER) |
m_adj(n, hlen); |
m_adj(n, hlen); |
if (last->inp_flags & INP_CONTROLOPTS |
if (last->inp_flags & INP_CONTROLOPTS |
#ifdef SO_OTIMESTAMP |
|| SOOPT_TIMESTAMP(last->inp_socket->so_options)) |
|| last->inp_socket->so_options & SO_OTIMESTAMP |
|
#endif |
|
|| last->inp_socket->so_options & SO_TIMESTAMP) |
|
ip_savecontrol(last, &opts, ip, n); |
ip_savecontrol(last, &opts, ip, n); |
if (sbappendaddr(&last->inp_socket->so_rcv, sa, n, opts) == 0) { |
if (sbappendaddr(&last->inp_socket->so_rcv, sa, n, opts) == 0) { |
/* should notify about lost packet */ |
/* should notify about lost packet */ |
Line 212 rip_input(struct mbuf *m, ...) |
|
Line 204 rip_input(struct mbuf *m, ...) |
|
; |
; |
#if defined(IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
else if (ipsec_used && |
else if (ipsec_used && ipsec_in_reject(m, last)) { |
ipsec4_in_reject_so(m, last->inp_socket)) { |
|
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
|
/* do not inject data to pcb */ |
/* do not inject data to pcb */ |
} |
} |
#endif /*IPSEC*/ |
#endif /*IPSEC*/ |
Line 227 rip_input(struct mbuf *m, ...) |
|
Line 217 rip_input(struct mbuf *m, ...) |
|
} |
} |
#if defined(IPSEC) |
#if defined(IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (ipsec_used && last != NULL |
if (ipsec_used && last != NULL && ipsec_in_reject(m, last)) { |
&& ipsec4_in_reject_so(m, last->inp_socket)) { |
|
m_freem(m); |
m_freem(m); |
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); |
|
IP_STATDEC(IP_STAT_DELIVERED); |
IP_STATDEC(IP_STAT_DELIVERED); |
/* do not inject data to pcb */ |
/* do not inject data to pcb */ |
} else |
} else |
Line 311 rip_ctlinput(int cmd, const struct socka |
|
Line 299 rip_ctlinput(int cmd, const struct socka |
|
* Tack on options user may have setup with control call. |
* Tack on options user may have setup with control call. |
*/ |
*/ |
int |
int |
rip_output(struct mbuf *m, struct inpcb *inp) |
rip_output(struct mbuf *m, struct inpcb *inp, struct mbuf *control, |
|
struct lwp *l) |
{ |
{ |
struct ip *ip; |
struct ip *ip; |
struct mbuf *opts; |
struct mbuf *opts; |
int flags; |
struct ip_pktopts pktopts; |
|
kauth_cred_t cred; |
flags = |
int error, flags; |
(inp->inp_socket->so_options & SO_DONTROUTE) | IP_ALLOWBROADCAST |
|
| IP_RETURNMTU; |
flags = (inp->inp_socket->so_options & SO_DONTROUTE) | |
|
IP_ALLOWBROADCAST | IP_RETURNMTU; |
|
|
|
if (l == NULL) |
|
cred = NULL; |
|
else |
|
cred = l->l_cred; |
|
|
|
/* Setup IP outgoing packet options */ |
|
memset(&pktopts, 0, sizeof(pktopts)); |
|
error = ip_setpktopts(control, &pktopts, &flags, inp, cred); |
|
if (control != NULL) |
|
m_freem(control); |
|
if (error != 0) |
|
goto release; |
|
|
/* |
/* |
* If the user handed us a complete IP packet, use it. |
* If the user handed us a complete IP packet, use it. |
Line 327 rip_output(struct mbuf *m, struct inpcb |
|
Line 330 rip_output(struct mbuf *m, struct inpcb |
|
*/ |
*/ |
if ((inp->inp_flags & INP_HDRINCL) == 0) { |
if ((inp->inp_flags & INP_HDRINCL) == 0) { |
if ((m->m_pkthdr.len + sizeof(struct ip)) > IP_MAXPACKET) { |
if ((m->m_pkthdr.len + sizeof(struct ip)) > IP_MAXPACKET) { |
m_freem(m); |
error = EMSGSIZE; |
return (EMSGSIZE); |
goto release; |
} |
} |
M_PREPEND(m, sizeof(struct ip), M_DONTWAIT); |
M_PREPEND(m, sizeof(struct ip), M_DONTWAIT); |
if (!m) |
if (!m) { |
return (ENOBUFS); |
error = ENOBUFS; |
|
goto release; |
|
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
ip->ip_tos = 0; |
ip->ip_tos = 0; |
ip->ip_off = htons(0); |
ip->ip_off = htons(0); |
ip->ip_p = inp->inp_ip.ip_p; |
ip->ip_p = inp->inp_ip.ip_p; |
ip->ip_len = htons(m->m_pkthdr.len); |
ip->ip_len = htons(m->m_pkthdr.len); |
ip->ip_src = inp->inp_laddr; |
ip->ip_src = pktopts.ippo_laddr.sin_addr; |
ip->ip_dst = inp->inp_faddr; |
ip->ip_dst = inp->inp_faddr; |
ip->ip_ttl = MAXTTL; |
ip->ip_ttl = MAXTTL; |
opts = inp->inp_options; |
opts = inp->inp_options; |
} else { |
} else { |
if (m->m_pkthdr.len > IP_MAXPACKET) { |
if (m->m_pkthdr.len > IP_MAXPACKET) { |
m_freem(m); |
error = EMSGSIZE; |
return (EMSGSIZE); |
goto release; |
} |
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
|
|
Line 358 rip_output(struct mbuf *m, struct inpcb |
|
Line 363 rip_output(struct mbuf *m, struct inpcb |
|
int hlen = ip->ip_hl << 2; |
int hlen = ip->ip_hl << 2; |
|
|
m = m_copyup(m, hlen, (max_linkhdr + 3) & ~3); |
m = m_copyup(m, hlen, (max_linkhdr + 3) & ~3); |
if (m == NULL) |
if (m == NULL) { |
return (ENOMEM); /* XXX */ |
error = ENOMEM; /* XXX */ |
|
goto release; |
|
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
} |
} |
|
|
/* XXX userland passes ip_len and ip_off in host order */ |
/* XXX userland passes ip_len and ip_off in host order */ |
if (m->m_pkthdr.len != ip->ip_len) { |
if (m->m_pkthdr.len != ip->ip_len) { |
m_freem(m); |
error = EINVAL; |
return (EINVAL); |
goto release; |
} |
} |
HTONS(ip->ip_len); |
HTONS(ip->ip_len); |
HTONS(ip->ip_off); |
HTONS(ip->ip_off); |
Line 382 rip_output(struct mbuf *m, struct inpcb |
|
Line 389 rip_output(struct mbuf *m, struct inpcb |
|
* IP output. Note: if IP_RETURNMTU flag is set, the MTU size |
* IP output. Note: if IP_RETURNMTU flag is set, the MTU size |
* will be stored in inp_errormtu. |
* will be stored in inp_errormtu. |
*/ |
*/ |
return ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
return ip_output(m, opts, &inp->inp_route, flags, pktopts.ippo_imo, |
inp->inp_socket); |
inp); |
|
|
|
release: |
|
if (m != NULL) |
|
m_freem(m); |
|
return error; |
} |
} |
|
|
/* |
/* |
|
|
rip_connect_pcb(struct inpcb *inp, struct sockaddr_in *addr) |
rip_connect_pcb(struct inpcb *inp, struct sockaddr_in *addr) |
{ |
{ |
|
|
if (IFNET_EMPTY()) |
if (IFNET_READER_EMPTY()) |
return (EADDRNOTAVAIL); |
return (EADDRNOTAVAIL); |
if (addr->sin_family != AF_INET) |
if (addr->sin_family != AF_INET) |
return (EAFNOSUPPORT); |
return (EAFNOSUPPORT); |
Line 555 rip_bind(struct socket *so, struct socka |
|
Line 567 rip_bind(struct socket *so, struct socka |
|
struct inpcb *inp = sotoinpcb(so); |
struct inpcb *inp = sotoinpcb(so); |
struct sockaddr_in *addr = (struct sockaddr_in *)nam; |
struct sockaddr_in *addr = (struct sockaddr_in *)nam; |
int error = 0; |
int error = 0; |
int s; |
int s, ss; |
struct ifaddr *ia; |
struct ifaddr *ifa; |
|
|
KASSERT(solocked(so)); |
KASSERT(solocked(so)); |
KASSERT(inp != NULL); |
KASSERT(inp != NULL); |
Line 566 rip_bind(struct socket *so, struct socka |
|
Line 578 rip_bind(struct socket *so, struct socka |
|
return EINVAL; |
return EINVAL; |
|
|
s = splsoftnet(); |
s = splsoftnet(); |
if (IFNET_EMPTY()) { |
if (IFNET_READER_EMPTY()) { |
error = EADDRNOTAVAIL; |
error = EADDRNOTAVAIL; |
goto release; |
goto release; |
} |
} |
Line 574 rip_bind(struct socket *so, struct socka |
|
Line 586 rip_bind(struct socket *so, struct socka |
|
error = EAFNOSUPPORT; |
error = EAFNOSUPPORT; |
goto release; |
goto release; |
} |
} |
if ((ia = ifa_ifwithaddr(sintosa(addr))) == 0 && |
ss = pserialize_read_enter(); |
|
if ((ifa = ifa_ifwithaddr(sintosa(addr))) == NULL && |
!in_nullhost(addr->sin_addr)) |
!in_nullhost(addr->sin_addr)) |
{ |
{ |
|
pserialize_read_exit(ss); |
error = EADDRNOTAVAIL; |
error = EADDRNOTAVAIL; |
goto release; |
goto release; |
} |
} |
if (ia && ((struct in_ifaddr *)ia)->ia4_flags & |
if (ifa && (ifatoia(ifa))->ia4_flags & IN6_IFF_DUPLICATED) { |
(IN6_IFF_NOTREADY | IN_IFF_DETACHED)) |
pserialize_read_exit(ss); |
{ |
|
error = EADDRNOTAVAIL; |
error = EADDRNOTAVAIL; |
goto release; |
goto release; |
} |
} |
|
pserialize_read_exit(ss); |
|
|
inp->inp_laddr = addr->sin_addr; |
inp->inp_laddr = addr->sin_addr; |
|
|
Line 753 rip_send(struct socket *so, struct mbuf |
|
Line 767 rip_send(struct socket *so, struct mbuf |
|
* Ship a packet out. The appropriate raw output |
* Ship a packet out. The appropriate raw output |
* routine handles any massaging necessary. |
* routine handles any massaging necessary. |
*/ |
*/ |
if (control && control->m_len) { |
|
m_freem(control); |
|
m_freem(m); |
|
return EINVAL; |
|
} |
|
|
|
s = splsoftnet(); |
s = splsoftnet(); |
if (nam) { |
if (nam) { |
if ((so->so_state & SS_ISCONNECTED) != 0) { |
if ((so->so_state & SS_ISCONNECTED) != 0) { |
Line 766 rip_send(struct socket *so, struct mbuf |
|
Line 774 rip_send(struct socket *so, struct mbuf |
|
goto die; |
goto die; |
} |
} |
error = rip_connect_pcb(inp, (struct sockaddr_in *)nam); |
error = rip_connect_pcb(inp, (struct sockaddr_in *)nam); |
if (error) { |
if (error) |
die: |
goto die; |
m_freem(m); |
|
splx(s); |
|
return error; |
|
} |
|
} else { |
} else { |
if ((so->so_state & SS_ISCONNECTED) == 0) { |
if ((so->so_state & SS_ISCONNECTED) == 0) { |
error = ENOTCONN; |
error = ENOTCONN; |
goto die; |
goto die; |
} |
} |
} |
} |
error = rip_output(m, inp); |
error = rip_output(m, inp, control, l); |
|
m = NULL; |
|
control = NULL; |
if (nam) |
if (nam) |
rip_disconnect1(inp); |
rip_disconnect1(inp); |
|
die: |
|
if (m != NULL) |
|
m_freem(m); |
|
if (control != NULL) |
|
m_freem(control); |
|
|
splx(s); |
splx(s); |
return error; |
return error; |
Line 805 rip_purgeif(struct socket *so, struct if |
|
Line 816 rip_purgeif(struct socket *so, struct if |
|
s = splsoftnet(); |
s = splsoftnet(); |
mutex_enter(softnet_lock); |
mutex_enter(softnet_lock); |
in_pcbpurgeif0(&rawcbtable, ifp); |
in_pcbpurgeif0(&rawcbtable, ifp); |
|
#ifdef NET_MPSAFE |
|
mutex_exit(softnet_lock); |
|
#endif |
in_purgeif(ifp); |
in_purgeif(ifp); |
|
#ifdef NET_MPSAFE |
|
mutex_enter(softnet_lock); |
|
#endif |
in_pcbpurgeif(&rawcbtable, ifp); |
in_pcbpurgeif(&rawcbtable, ifp); |
mutex_exit(softnet_lock); |
mutex_exit(softnet_lock); |
splx(s); |
splx(s); |