version 1.103.2.5, 2004/12/18 09:33:06 |
version 1.103.2.8, 2005/03/04 16:53:30 |
Line 95 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 95 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet/udp.h> |
#include <netinet/udp.h> |
#include <netinet/udp_var.h> |
#include <netinet/udp_var.h> |
|
|
|
#ifdef IPSEC_NAT_T |
|
#include <netinet6/ipsec.h> |
|
#include <netinet6/esp.h> |
|
#endif |
|
|
#ifdef INET6 |
#ifdef INET6 |
#include <netinet/ip6.h> |
#include <netinet/ip6.h> |
#include <netinet/icmp6.h> |
#include <netinet/icmp6.h> |
Line 141 int udpcksum = 1; |
|
Line 146 int udpcksum = 1; |
|
#else |
#else |
int udpcksum = 0; /* XXX */ |
int udpcksum = 0; /* XXX */ |
#endif |
#endif |
int udp_do_loopback_cksum = 1; |
int udp_do_loopback_cksum = 0; |
|
|
struct inpcbtable udbtable; |
struct inpcbtable udbtable; |
struct udpstat udpstat; |
struct udpstat udpstat; |
|
|
#ifdef INET |
#ifdef INET |
|
#ifdef IPSEC_NAT_T |
|
static int udp4_espinudp (struct mbuf *, int, struct sockaddr *, |
|
struct socket *); |
|
#endif |
static void udp4_sendup (struct mbuf *, int, struct sockaddr *, |
static void udp4_sendup (struct mbuf *, int, struct sockaddr *, |
struct socket *); |
struct socket *); |
static int udp4_realinput (struct sockaddr_in *, struct sockaddr_in *, |
static int udp4_realinput (struct sockaddr_in *, struct sockaddr_in *, |
struct mbuf *, int); |
struct mbuf *, int); |
|
static int udp4_input_checksum(struct mbuf *, const struct udphdr *, int, int); |
#endif |
#endif |
#ifdef INET6 |
#ifdef INET6 |
static void udp6_sendup (struct mbuf *, int, struct sockaddr *, |
static void udp6_sendup (struct mbuf *, int, struct sockaddr *, |
struct socket *); |
struct socket *); |
static int udp6_realinput (int, struct sockaddr_in6 *, |
static int udp6_realinput (int, struct sockaddr_in6 *, |
struct sockaddr_in6 *, struct mbuf *, int); |
struct sockaddr_in6 *, struct mbuf *, int); |
|
static int udp6_input_checksum(struct mbuf *, const struct udphdr *, int, int); |
#endif |
#endif |
#ifdef INET |
#ifdef INET |
static void udp_notify (struct inpcb *, int); |
static void udp_notify (struct inpcb *, int); |
|
|
MOWNER_ATTACH(&udp_mowner); |
MOWNER_ATTACH(&udp_mowner); |
} |
} |
|
|
|
/* |
|
* Checksum extended UDP header and data. |
|
*/ |
|
|
|
int |
|
udp_input_checksum(int af, struct mbuf *m, const struct udphdr *uh, |
|
int iphlen, int len) |
|
{ |
|
|
|
switch (af) { |
#ifdef INET |
#ifdef INET |
|
case AF_INET: |
|
return udp4_input_checksum(m, uh, iphlen, len); |
|
#endif |
|
#ifdef INET6 |
|
case AF_INET6: |
|
return udp6_input_checksum(m, uh, iphlen, len); |
|
#endif |
|
} |
|
#ifdef DIAGNOSTIC |
|
panic("udp_input_checksum: unknown af %d", af); |
|
#endif |
|
/* NOTREACHED */ |
|
return -1; |
|
} |
|
|
|
#ifdef INET |
|
|
|
/* |
|
* Checksum extended UDP header and data. |
|
*/ |
|
|
|
static int |
|
udp4_input_checksum(struct mbuf *m, const struct udphdr *uh, |
|
int iphlen, int len) |
|
{ |
|
|
|
/* |
|
* XXX it's better to record and check if this mbuf is |
|
* already checked. |
|
*/ |
|
|
|
if (uh->uh_sum == 0) |
|
return 0; |
|
|
|
switch (m->m_pkthdr.csum_flags & |
|
((m->m_pkthdr.rcvif->if_csum_flags_rx & M_CSUM_UDPv4) | |
|
M_CSUM_TCP_UDP_BAD | M_CSUM_DATA)) { |
|
case M_CSUM_UDPv4|M_CSUM_TCP_UDP_BAD: |
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_bad); |
|
goto badcsum; |
|
|
|
case M_CSUM_UDPv4|M_CSUM_DATA: { |
|
u_int32_t hw_csum = m->m_pkthdr.csum_data; |
|
|
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_data); |
|
if (m->m_pkthdr.csum_flags & M_CSUM_NO_PSEUDOHDR) { |
|
const struct ip *ip = |
|
mtod(m, const struct ip *); |
|
|
|
hw_csum = in_cksum_phdr(ip->ip_src.s_addr, |
|
ip->ip_dst.s_addr, |
|
htons(hw_csum + len + IPPROTO_UDP)); |
|
} |
|
if ((hw_csum ^ 0xffff) != 0) |
|
goto badcsum; |
|
break; |
|
} |
|
|
|
case M_CSUM_UDPv4: |
|
/* Checksum was okay. */ |
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_ok); |
|
break; |
|
|
|
default: |
|
/* |
|
* Need to compute it ourselves. Maybe skip checksum |
|
* on loopback interfaces. |
|
*/ |
|
if (__predict_true(!(m->m_pkthdr.rcvif->if_flags & |
|
IFF_LOOPBACK) || |
|
udp_do_loopback_cksum)) { |
|
UDP_CSUM_COUNTER_INCR(&udp_swcsum); |
|
if (in4_cksum(m, IPPROTO_UDP, iphlen, len) != 0) |
|
goto badcsum; |
|
} |
|
break; |
|
} |
|
|
|
return 0; |
|
|
|
badcsum: |
|
udpstat.udps_badsum++; |
|
return -1; |
|
} |
|
|
void |
void |
udp_input(struct mbuf *m, ...) |
udp_input(struct mbuf *m, ...) |
{ |
{ |
Line 262 udp_input(struct mbuf *m, ...) |
|
Line 368 udp_input(struct mbuf *m, ...) |
|
/* |
/* |
* Checksum extended UDP header and data. |
* Checksum extended UDP header and data. |
*/ |
*/ |
if (uh->uh_sum) { |
if (udp4_input_checksum(m, uh, iphlen, len)) |
switch (m->m_pkthdr.csum_flags & |
goto badcsum; |
((m->m_pkthdr.rcvif->if_csum_flags_rx & M_CSUM_UDPv4) | |
|
M_CSUM_TCP_UDP_BAD | M_CSUM_DATA)) { |
|
case M_CSUM_UDPv4|M_CSUM_TCP_UDP_BAD: |
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_bad); |
|
goto badcsum; |
|
|
|
case M_CSUM_UDPv4|M_CSUM_DATA: { |
|
u_int32_t hw_csum = m->m_pkthdr.csum_data; |
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_data); |
|
if (m->m_pkthdr.csum_flags & M_CSUM_NO_PSEUDOHDR) |
|
hw_csum = in_cksum_phdr(ip->ip_src.s_addr, |
|
ip->ip_dst.s_addr, |
|
htons(hw_csum + len + IPPROTO_UDP)); |
|
if ((hw_csum ^ 0xffff) != 0) |
|
goto badcsum; |
|
break; |
|
} |
|
|
|
case M_CSUM_UDPv4: |
|
/* Checksum was okay. */ |
|
UDP_CSUM_COUNTER_INCR(&udp_hwcsum_ok); |
|
break; |
|
|
|
default: |
|
/* |
|
* Need to compute it ourselves. Maybe skip checksum |
|
* on loopback interfaces. |
|
*/ |
|
if (__predict_true(!(m->m_pkthdr.rcvif->if_flags & |
|
IFF_LOOPBACK) || |
|
udp_do_loopback_cksum)) { |
|
UDP_CSUM_COUNTER_INCR(&udp_swcsum); |
|
if (in4_cksum(m, IPPROTO_UDP, iphlen, len) != 0) |
|
goto badcsum; |
|
} |
|
break; |
|
} |
|
} |
|
|
|
/* construct source and dst sockaddrs. */ |
/* construct source and dst sockaddrs. */ |
bzero(&src, sizeof(src)); |
bzero(&src, sizeof(src)); |
|
|
|
|
badcsum: |
badcsum: |
m_freem(m); |
m_freem(m); |
udpstat.udps_badsum++; |
|
} |
} |
#endif |
#endif |
|
|
#ifdef INET6 |
#ifdef INET6 |
|
static int |
|
udp6_input_checksum(struct mbuf *m, const struct udphdr *uh, int off, int len) |
|
{ |
|
|
|
if (__predict_false((m->m_flags & M_LOOP) && !udp_do_loopback_cksum)) { |
|
goto good; |
|
} |
|
if (uh->uh_sum == 0) { |
|
udp6stat.udp6s_nosum++; |
|
goto bad; |
|
} |
|
if (in6_cksum(m, IPPROTO_UDP, off, len) != 0) { |
|
udp6stat.udp6s_badsum++; |
|
goto bad; |
|
} |
|
|
|
good: |
|
return 0; |
|
bad: |
|
return -1; |
|
} |
|
|
int |
int |
udp6_input(struct mbuf **mp, int *offp, int proto) |
udp6_input(struct mbuf **mp, int *offp, int proto) |
{ |
{ |
Line 430 udp6_input(struct mbuf **mp, int *offp, |
|
Line 519 udp6_input(struct mbuf **mp, int *offp, |
|
* Checksum extended UDP header and data. Maybe skip checksum |
* Checksum extended UDP header and data. Maybe skip checksum |
* on loopback interfaces. |
* on loopback interfaces. |
*/ |
*/ |
if (__predict_true(!(m->m_pkthdr.rcvif->if_flags & |
if (udp6_input_checksum(m, uh, off, ulen)) |
IFF_LOOPBACK) || |
goto bad; |
udp_do_loopback_cksum)) { |
|
if (uh->uh_sum == 0) { |
|
udp6stat.udp6s_nosum++; |
|
goto bad; |
|
} |
|
if (in6_cksum(m, IPPROTO_UDP, off, ulen) != 0) { |
|
udp6stat.udp6s_badsum++; |
|
goto bad; |
|
} |
|
} |
|
|
|
/* |
/* |
* Construct source and dst sockaddrs. |
* Construct source and dst sockaddrs. |
Line 670 udp4_realinput(struct sockaddr_in *src, |
|
Line 749 udp4_realinput(struct sockaddr_in *src, |
|
return rcvcnt; |
return rcvcnt; |
} |
} |
|
|
|
#ifdef IPSEC_NAT_T |
|
/* Handle ESP over UDP */ |
|
if (inp->inp_flags & INP_ESPINUDP_ALL) { |
|
struct sockaddr *sa = (struct sockaddr *)src; |
|
|
|
if (udp4_espinudp(m, off, sa, inp->inp_socket) != 0) { |
|
rcvcnt++; |
|
goto bad; |
|
} |
|
|
|
/* Normal UDP processing will take place */ |
|
} |
|
#endif |
|
|
udp4_sendup(m, off, (struct sockaddr *)src, inp->inp_socket); |
udp4_sendup(m, off, (struct sockaddr *)src, inp->inp_socket); |
rcvcnt++; |
rcvcnt++; |
} |
} |
Line 839 udp_ctlinput(int cmd, struct sockaddr *s |
|
Line 932 udp_ctlinput(int cmd, struct sockaddr *s |
|
} |
} |
|
|
int |
int |
|
udp_ctloutput(op, so, level, optname, mp) |
|
int op; |
|
struct socket *so; |
|
int level, optname; |
|
struct mbuf **mp; |
|
{ |
|
int s; |
|
int error = 0; |
|
struct mbuf *m; |
|
struct inpcb *inp; |
|
int family; |
|
|
|
family = so->so_proto->pr_domain->dom_family; |
|
|
|
s = splsoftnet(); |
|
switch (family) { |
|
#ifdef INET |
|
case PF_INET: |
|
if (level != IPPROTO_UDP) { |
|
error = ip_ctloutput(op, so, level, optname, mp); |
|
goto end; |
|
} |
|
break; |
|
#endif |
|
#ifdef INET6 |
|
case PF_INET6: |
|
if (level != IPPROTO_UDP) { |
|
error = ip6_ctloutput(op, so, level, optname, mp); |
|
goto end; |
|
} |
|
break; |
|
#endif |
|
default: |
|
error = EAFNOSUPPORT; |
|
goto end; |
|
break; |
|
} |
|
|
|
|
|
switch (op) { |
|
case PRCO_SETOPT: |
|
m = *mp; |
|
inp = sotoinpcb(so); |
|
|
|
switch (optname) { |
|
case UDP_ENCAP: |
|
if (m == NULL || m->m_len < sizeof (int)) { |
|
error = EINVAL; |
|
goto end; |
|
} |
|
|
|
switch(*mtod(m, int *)) { |
|
#ifdef IPSEC_NAT_T |
|
case 0: |
|
inp->inp_flags &= ~INP_ESPINUDP_ALL; |
|
break; |
|
|
|
case UDP_ENCAP_ESPINUDP: |
|
inp->inp_flags &= ~INP_ESPINUDP_ALL; |
|
inp->inp_flags |= INP_ESPINUDP; |
|
break; |
|
|
|
case UDP_ENCAP_ESPINUDP_NON_IKE: |
|
inp->inp_flags &= ~INP_ESPINUDP_ALL; |
|
inp->inp_flags |= INP_ESPINUDP_NON_IKE; |
|
break; |
|
#endif |
|
default: |
|
error = EINVAL; |
|
goto end; |
|
break; |
|
} |
|
break; |
|
|
|
default: |
|
error = ENOPROTOOPT; |
|
goto end; |
|
break; |
|
} |
|
break; |
|
|
|
default: |
|
error = EINVAL; |
|
goto end; |
|
break; |
|
} |
|
|
|
end: |
|
splx(s); |
|
return error; |
|
} |
|
|
|
|
|
int |
udp_output(struct mbuf *m, ...) |
udp_output(struct mbuf *m, ...) |
{ |
{ |
struct inpcb *inp; |
struct inpcb *inp; |
Line 1151 SYSCTL_SETUP(sysctl_net_inet_udp_setup, |
|
Line 1338 SYSCTL_SETUP(sysctl_net_inet_udp_setup, |
|
CTL_EOL); |
CTL_EOL); |
} |
} |
#endif |
#endif |
|
|
|
#if (defined INET && defined IPSEC_NAT_T) |
|
/* |
|
* Returns: |
|
* 1 if the packet was processed |
|
* 0 if normal UDP processing should take place |
|
*/ |
|
static int |
|
udp4_espinudp(m, off, src, so) |
|
struct mbuf *m; |
|
int off; |
|
struct sockaddr *src; |
|
struct socket *so; |
|
{ |
|
size_t len; |
|
caddr_t data; |
|
struct inpcb *inp; |
|
size_t skip = 0; |
|
size_t minlen; |
|
size_t iphdrlen; |
|
struct ip *ip; |
|
struct mbuf *n; |
|
|
|
/* |
|
* Collapse the mbuf chain if the first mbuf is too short |
|
* The longest case is: UDP + non ESP marker + ESP |
|
*/ |
|
minlen = off + sizeof(u_int64_t) + sizeof(struct esp); |
|
if (minlen > m->m_pkthdr.len) |
|
minlen = m->m_pkthdr.len; |
|
|
|
if (m->m_len < minlen) { |
|
if ((m = m_pullup(m, minlen)) == NULL) { |
|
printf("udp4_espinudp: m_pullup failed\n"); |
|
return 0; |
|
} |
|
} |
|
|
|
len = m->m_len - off; |
|
data = mtod(m, caddr_t) + off; |
|
inp = sotoinpcb(so); |
|
|
|
/* Ignore keepalive packets */ |
|
if ((len == 1) && (data[0] == '\xff')) { |
|
return 1; |
|
} |
|
|
|
/* |
|
* Check that the payload is long enough to hold |
|
* an ESP header and compute the length of encapsulation |
|
* header to remove |
|
*/ |
|
if (inp->inp_flags & INP_ESPINUDP) { |
|
u_int32_t *st = (u_int32_t *)data; |
|
|
|
if ((len <= sizeof(struct esp)) || (*st == 0)) |
|
return 0; /* Normal UDP processing */ |
|
|
|
skip = sizeof(struct udphdr); |
|
} |
|
|
|
if (inp->inp_flags & INP_ESPINUDP_NON_IKE) { |
|
u_int64_t *st = (u_int64_t *)data; |
|
|
|
if ((len <= sizeof(u_int64_t) + sizeof(struct esp)) |
|
|| (*st != 0)) |
|
return 0; /* Normal UDP processing */ |
|
|
|
skip = sizeof(struct udphdr) + sizeof(u_int64_t); |
|
} |
|
|
|
/* |
|
* Remove the UDP header (and possibly the non ESP marker) |
|
* IP header lendth is iphdrlen |
|
* Before: |
|
* <--- off ---> |
|
* +----+------+-----+ |
|
* | IP | UDP | ESP | |
|
* +----+------+-----+ |
|
* <-skip-> |
|
* After: |
|
* +----+-----+ |
|
* | IP | ESP | |
|
* +----+-----+ |
|
* <-skip-> |
|
*/ |
|
iphdrlen = off - sizeof(struct udphdr); |
|
memmove(mtod(m, caddr_t) + skip, mtod(m, caddr_t), iphdrlen); |
|
m_adj(m, skip); |
|
|
|
ip = mtod(m, struct ip *); |
|
ip->ip_len = htons(ntohs(ip->ip_len) - skip); |
|
ip->ip_p = IPPROTO_ESP; |
|
|
|
/* |
|
* Copy the mbuf to avoid multiple free, as both |
|
* esp4_input (which we call) and udp_input (which |
|
* called us) free the mbuf. |
|
*/ |
|
if ((n = m_dup(m, 0, M_COPYALL, M_DONTWAIT)) == NULL) { |
|
printf("udp4_espinudp: m_dup failed\n"); |
|
return 0; |
|
} |
|
|
|
esp4_input(n, iphdrlen); |
|
|
|
/* We handled it, it shoudln't be handled by UDP */ |
|
return 1; |
|
} |
|
#endif |