xref: /freebsd/sys/netinet/udp_usrreq.c (revision acd3428b7d3e94cef0e1881c868cb4b131d4ff41)
1c398230bSWarner Losh /*-
26dfab5b1SGarrett Wollman  * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
14df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
15df8bae1dSRodney W. Grimes  *    without specific prior written permission.
16df8bae1dSRodney W. Grimes  *
17df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
28df8bae1dSRodney W. Grimes  *
296dfab5b1SGarrett Wollman  *	@(#)udp_usrreq.c	8.6 (Berkeley) 5/23/95
30c3aac50fSPeter Wemm  * $FreeBSD$
31df8bae1dSRodney W. Grimes  */
32df8bae1dSRodney W. Grimes 
330b4ae859SGleb Smirnoff #include "opt_ipfw.h"
346a800098SYoshinobu Inoue #include "opt_ipsec.h"
35cfa1ca9dSYoshinobu Inoue #include "opt_inet6.h"
36bdb3fa18SRobert Watson #include "opt_mac.h"
37cfa1ca9dSYoshinobu Inoue 
38df8bae1dSRodney W. Grimes #include <sys/param.h>
3926f9a767SRodney W. Grimes #include <sys/systm.h>
40960ed29cSSeigo Tanimura #include <sys/domain.h>
414f590175SPaul Saab #include <sys/eventhandler.h>
42960ed29cSSeigo Tanimura #include <sys/jail.h>
43b110a8a2SGarrett Wollman #include <sys/kernel.h>
44960ed29cSSeigo Tanimura #include <sys/lock.h>
45df8bae1dSRodney W. Grimes #include <sys/malloc.h>
46df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
47acd3428bSRobert Watson #include <sys/priv.h>
48490d50b6SBrian Feldman #include <sys/proc.h>
49df8bae1dSRodney W. Grimes #include <sys/protosw.h>
50960ed29cSSeigo Tanimura #include <sys/signalvar.h>
51df8bae1dSRodney W. Grimes #include <sys/socket.h>
52df8bae1dSRodney W. Grimes #include <sys/socketvar.h>
53960ed29cSSeigo Tanimura #include <sys/sx.h>
54b5e8ce9fSBruce Evans #include <sys/sysctl.h>
55816a3d83SPoul-Henning Kamp #include <sys/syslog.h>
568781d8e9SBruce Evans 
5769c2d429SJeff Roberson #include <vm/uma.h>
58df8bae1dSRodney W. Grimes 
59df8bae1dSRodney W. Grimes #include <net/if.h>
60df8bae1dSRodney W. Grimes #include <net/route.h>
61df8bae1dSRodney W. Grimes 
62df8bae1dSRodney W. Grimes #include <netinet/in.h>
63df8bae1dSRodney W. Grimes #include <netinet/in_systm.h>
64960ed29cSSeigo Tanimura #include <netinet/in_pcb.h>
65960ed29cSSeigo Tanimura #include <netinet/in_var.h>
66df8bae1dSRodney W. Grimes #include <netinet/ip.h>
67cfa1ca9dSYoshinobu Inoue #ifdef INET6
68cfa1ca9dSYoshinobu Inoue #include <netinet/ip6.h>
69cfa1ca9dSYoshinobu Inoue #endif
70960ed29cSSeigo Tanimura #include <netinet/ip_icmp.h>
71960ed29cSSeigo Tanimura #include <netinet/icmp_var.h>
72df8bae1dSRodney W. Grimes #include <netinet/ip_var.h>
73ef39adf0SAndre Oppermann #include <netinet/ip_options.h>
74cfa1ca9dSYoshinobu Inoue #ifdef INET6
75cfa1ca9dSYoshinobu Inoue #include <netinet6/ip6_var.h>
76cfa1ca9dSYoshinobu Inoue #endif
77df8bae1dSRodney W. Grimes #include <netinet/udp.h>
78df8bae1dSRodney W. Grimes #include <netinet/udp_var.h>
79df8bae1dSRodney W. Grimes 
80b9234fafSSam Leffler #ifdef FAST_IPSEC
81b9234fafSSam Leffler #include <netipsec/ipsec.h>
82b9234fafSSam Leffler #endif /*FAST_IPSEC*/
83b9234fafSSam Leffler 
84cfa1ca9dSYoshinobu Inoue #ifdef IPSEC
85cfa1ca9dSYoshinobu Inoue #include <netinet6/ipsec.h>
86cfa1ca9dSYoshinobu Inoue #endif /*IPSEC*/
87cfa1ca9dSYoshinobu Inoue 
88db4f9cc7SJonathan Lemon #include <machine/in_cksum.h>
89db4f9cc7SJonathan Lemon 
90aed55708SRobert Watson #include <security/mac/mac_framework.h>
91aed55708SRobert Watson 
92df8bae1dSRodney W. Grimes /*
93df8bae1dSRodney W. Grimes  * UDP protocol implementation.
94df8bae1dSRodney W. Grimes  * Per RFC 768, August, 1980.
95df8bae1dSRodney W. Grimes  */
96df8bae1dSRodney W. Grimes #ifndef	COMPAT_42
970312fbe9SPoul-Henning Kamp static int	udpcksum = 1;
98df8bae1dSRodney W. Grimes #else
990312fbe9SPoul-Henning Kamp static int	udpcksum = 0;		/* XXX */
100df8bae1dSRodney W. Grimes #endif
1010312fbe9SPoul-Henning Kamp SYSCTL_INT(_net_inet_udp, UDPCTL_CHECKSUM, checksum, CTLFLAG_RW,
1020312fbe9SPoul-Henning Kamp 		&udpcksum, 0, "");
103df8bae1dSRodney W. Grimes 
104032dcc76SLuigi Rizzo int	log_in_vain = 0;
105816a3d83SPoul-Henning Kamp SYSCTL_INT(_net_inet_udp, OID_AUTO, log_in_vain, CTLFLAG_RW,
1063d177f46SBill Fumerola     &log_in_vain, 0, "Log all incoming UDP packets");
107816a3d83SPoul-Henning Kamp 
108032dcc76SLuigi Rizzo static int	blackhole = 0;
10916f7f31fSGeoff Rehmet SYSCTL_INT(_net_inet_udp, OID_AUTO, blackhole, CTLFLAG_RW,
11016f7f31fSGeoff Rehmet 	&blackhole, 0, "Do not send port unreachables for refused connects");
11116f7f31fSGeoff Rehmet 
11283453a06SBruce M Simpson static int	strict_mcast_mship = 0;
11383453a06SBruce M Simpson SYSCTL_INT(_net_inet_udp, OID_AUTO, strict_mcast_mship, CTLFLAG_RW,
11483453a06SBruce M Simpson 	&strict_mcast_mship, 0, "Only send multicast to member sockets");
11583453a06SBruce M Simpson 
11676429de4SYoshinobu Inoue struct	inpcbhead udb;		/* from udp_var.h */
117cfa1ca9dSYoshinobu Inoue #define	udb6	udb  /* for KAME src sync over BSD*'s */
1187a2aab80SBrian Feldman struct	inpcbinfo udbinfo;
11915bd2b43SDavid Greenman 
12015bd2b43SDavid Greenman #ifndef UDBHASHSIZE
121c3229e05SDavid Greenman #define UDBHASHSIZE 16
12215bd2b43SDavid Greenman #endif
12315bd2b43SDavid Greenman 
12476429de4SYoshinobu Inoue struct	udpstat udpstat;	/* from udp_var.h */
125c73d99b5SRuslan Ermilov SYSCTL_STRUCT(_net_inet_udp, UDPCTL_STATS, stats, CTLFLAG_RW,
1263d177f46SBill Fumerola     &udpstat, udpstat, "UDP statistics (struct udpstat, netinet/udp_var.h)");
127f2ea20e6SGarrett Wollman 
128c1cd65baSBruce Evans static void udp_append(struct inpcb *last, struct ip *ip, struct mbuf *n,
129d4b509bdSRobert Watson 		int off, struct sockaddr_in *udp_in);
130cfa1ca9dSYoshinobu Inoue 
131bc725eafSRobert Watson static void udp_detach(struct socket *so);
1324d77a549SAlfred Perlstein static	int udp_output(struct inpcb *, struct mbuf *, struct sockaddr *,
1334d77a549SAlfred Perlstein 		struct mbuf *, struct thread *);
134df8bae1dSRodney W. Grimes 
1354f590175SPaul Saab static void
1364f590175SPaul Saab udp_zone_change(void *tag)
1374f590175SPaul Saab {
1384f590175SPaul Saab 
1394f590175SPaul Saab 	uma_zone_set_max(udbinfo.ipi_zone, maxsockets);
1404f590175SPaul Saab }
1414f590175SPaul Saab 
142d915b280SStephan Uphoff static int
143d915b280SStephan Uphoff udp_inpcb_init(void *mem, int size, int flags)
144d915b280SStephan Uphoff {
145d915b280SStephan Uphoff 	struct inpcb *inp = (struct inpcb *) mem;
146d915b280SStephan Uphoff 	INP_LOCK_INIT(inp, "inp", "udpinp");
147d915b280SStephan Uphoff 	return (0);
148d915b280SStephan Uphoff }
149d915b280SStephan Uphoff 
150df8bae1dSRodney W. Grimes void
151032dcc76SLuigi Rizzo udp_init()
152df8bae1dSRodney W. Grimes {
153f76fcf6dSJeffrey Hsu 	INP_INFO_LOCK_INIT(&udbinfo, "udp");
15415bd2b43SDavid Greenman 	LIST_INIT(&udb);
15515bd2b43SDavid Greenman 	udbinfo.listhead = &udb;
156ddd79a97SDavid Greenman 	udbinfo.hashbase = hashinit(UDBHASHSIZE, M_PCB, &udbinfo.hashmask);
1578781d8e9SBruce Evans 	udbinfo.porthashbase = hashinit(UDBHASHSIZE, M_PCB,
1588781d8e9SBruce Evans 					&udbinfo.porthashmask);
15969c2d429SJeff Roberson 	udbinfo.ipi_zone = uma_zcreate("udpcb", sizeof(struct inpcb), NULL,
160d915b280SStephan Uphoff 	    NULL, udp_inpcb_init, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
16169c2d429SJeff Roberson 	uma_zone_set_max(udbinfo.ipi_zone, maxsockets);
1624f590175SPaul Saab 	EVENTHANDLER_REGISTER(maxsockets_change, udp_zone_change, NULL,
1634f590175SPaul Saab 		EVENTHANDLER_PRI_ANY);
164df8bae1dSRodney W. Grimes }
165df8bae1dSRodney W. Grimes 
166df8bae1dSRodney W. Grimes void
167032dcc76SLuigi Rizzo udp_input(m, off)
168032dcc76SLuigi Rizzo 	register struct mbuf *m;
169032dcc76SLuigi Rizzo 	int off;
170df8bae1dSRodney W. Grimes {
171cfa1ca9dSYoshinobu Inoue 	int iphlen = off;
172032dcc76SLuigi Rizzo 	register struct ip *ip;
173032dcc76SLuigi Rizzo 	register struct udphdr *uh;
174032dcc76SLuigi Rizzo 	register struct inpcb *inp;
175df8bae1dSRodney W. Grimes 	int len;
176df8bae1dSRodney W. Grimes 	struct ip save_ip;
177d4b509bdSRobert Watson 	struct sockaddr_in udp_in;
1780b4ae859SGleb Smirnoff #ifdef IPFIREWALL_FORWARD
1790b4ae859SGleb Smirnoff 	struct m_tag *fwd_tag;
1800b4ae859SGleb Smirnoff #endif
181df8bae1dSRodney W. Grimes 
182df8bae1dSRodney W. Grimes 	udpstat.udps_ipackets++;
183df8bae1dSRodney W. Grimes 
184df8bae1dSRodney W. Grimes 	/*
185df8bae1dSRodney W. Grimes 	 * Strip IP options, if any; should skip this,
186df8bae1dSRodney W. Grimes 	 * make available to user, and use on returned packets,
187df8bae1dSRodney W. Grimes 	 * but we don't yet have a way to check the checksum
188df8bae1dSRodney W. Grimes 	 * with options still present.
189df8bae1dSRodney W. Grimes 	 */
190df8bae1dSRodney W. Grimes 	if (iphlen > sizeof (struct ip)) {
191df8bae1dSRodney W. Grimes 		ip_stripoptions(m, (struct mbuf *)0);
192df8bae1dSRodney W. Grimes 		iphlen = sizeof(struct ip);
193df8bae1dSRodney W. Grimes 	}
194df8bae1dSRodney W. Grimes 
195df8bae1dSRodney W. Grimes 	/*
196df8bae1dSRodney W. Grimes 	 * Get IP and UDP header together in first mbuf.
197df8bae1dSRodney W. Grimes 	 */
198df8bae1dSRodney W. Grimes 	ip = mtod(m, struct ip *);
199df8bae1dSRodney W. Grimes 	if (m->m_len < iphlen + sizeof(struct udphdr)) {
200df8bae1dSRodney W. Grimes 		if ((m = m_pullup(m, iphlen + sizeof(struct udphdr))) == 0) {
201df8bae1dSRodney W. Grimes 			udpstat.udps_hdrops++;
202df8bae1dSRodney W. Grimes 			return;
203df8bae1dSRodney W. Grimes 		}
204df8bae1dSRodney W. Grimes 		ip = mtod(m, struct ip *);
205df8bae1dSRodney W. Grimes 	}
206df8bae1dSRodney W. Grimes 	uh = (struct udphdr *)((caddr_t)ip + iphlen);
207df8bae1dSRodney W. Grimes 
208686cdd19SJun-ichiro itojun Hagino 	/* destination port of 0 is illegal, based on RFC768. */
209686cdd19SJun-ichiro itojun Hagino 	if (uh->uh_dport == 0)
210f76fcf6dSJeffrey Hsu 		goto badunlocked;
211686cdd19SJun-ichiro itojun Hagino 
212df8bae1dSRodney W. Grimes 	/*
213b9234fafSSam Leffler 	 * Construct sockaddr format source address.
214b9234fafSSam Leffler 	 * Stuff source address and datagram in user buffer.
215b9234fafSSam Leffler 	 */
216d4b509bdSRobert Watson 	bzero(&udp_in, sizeof(udp_in));
217d4b509bdSRobert Watson 	udp_in.sin_len = sizeof(udp_in);
218d4b509bdSRobert Watson 	udp_in.sin_family = AF_INET;
219b9234fafSSam Leffler 	udp_in.sin_port = uh->uh_sport;
220b9234fafSSam Leffler 	udp_in.sin_addr = ip->ip_src;
221b9234fafSSam Leffler 
222b9234fafSSam Leffler 	/*
223df8bae1dSRodney W. Grimes 	 * Make mbuf data length reflect UDP length.
224df8bae1dSRodney W. Grimes 	 * If not enough data to reflect UDP length, drop.
225df8bae1dSRodney W. Grimes 	 */
226df8bae1dSRodney W. Grimes 	len = ntohs((u_short)uh->uh_ulen);
227df8bae1dSRodney W. Grimes 	if (ip->ip_len != len) {
2287eb7a449SAndras Olah 		if (len > ip->ip_len || len < sizeof(struct udphdr)) {
229df8bae1dSRodney W. Grimes 			udpstat.udps_badlen++;
230f76fcf6dSJeffrey Hsu 			goto badunlocked;
231df8bae1dSRodney W. Grimes 		}
232df8bae1dSRodney W. Grimes 		m_adj(m, len - ip->ip_len);
233df8bae1dSRodney W. Grimes 		/* ip->ip_len = len; */
234df8bae1dSRodney W. Grimes 	}
235df8bae1dSRodney W. Grimes 	/*
236df8bae1dSRodney W. Grimes 	 * Save a copy of the IP header in case we want restore it
237df8bae1dSRodney W. Grimes 	 * for sending an ICMP error message in response.
238df8bae1dSRodney W. Grimes 	 */
23948cb400fSRuslan Ermilov 	if (!blackhole)
240df8bae1dSRodney W. Grimes 		save_ip = *ip;
241df8bae1dSRodney W. Grimes 
242df8bae1dSRodney W. Grimes 	/*
243df8bae1dSRodney W. Grimes 	 * Checksum extended UDP header and data.
244df8bae1dSRodney W. Grimes 	 */
2456dfab5b1SGarrett Wollman 	if (uh->uh_sum) {
246db4f9cc7SJonathan Lemon 		if (m->m_pkthdr.csum_flags & CSUM_DATA_VALID) {
247db4f9cc7SJonathan Lemon 			if (m->m_pkthdr.csum_flags & CSUM_PSEUDO_HDR)
248db4f9cc7SJonathan Lemon 				uh->uh_sum = m->m_pkthdr.csum_data;
249db4f9cc7SJonathan Lemon 			else
250db4f9cc7SJonathan Lemon 				uh->uh_sum = in_pseudo(ip->ip_src.s_addr,
251506f4949SRuslan Ermilov 				    ip->ip_dst.s_addr, htonl((u_short)len +
252db4f9cc7SJonathan Lemon 				    m->m_pkthdr.csum_data + IPPROTO_UDP));
253db4f9cc7SJonathan Lemon 			uh->uh_sum ^= 0xffff;
254db4f9cc7SJonathan Lemon 		} else {
255cb342100SHajimu UMEMOTO 			char b[9];
256cb342100SHajimu UMEMOTO 			bcopy(((struct ipovly *)ip)->ih_x1, b, 9);
2576effc713SDoug Rabson 			bzero(((struct ipovly *)ip)->ih_x1, 9);
258df8bae1dSRodney W. Grimes 			((struct ipovly *)ip)->ih_len = uh->uh_ulen;
259623ae52eSPoul-Henning Kamp 			uh->uh_sum = in_cksum(m, len + sizeof (struct ip));
260cb342100SHajimu UMEMOTO 			bcopy(b, ((struct ipovly *)ip)->ih_x1, 9);
261db4f9cc7SJonathan Lemon 		}
262623ae52eSPoul-Henning Kamp 		if (uh->uh_sum) {
263df8bae1dSRodney W. Grimes 			udpstat.udps_badsum++;
264df8bae1dSRodney W. Grimes 			m_freem(m);
265df8bae1dSRodney W. Grimes 			return;
266df8bae1dSRodney W. Grimes 		}
267fb9aaba0SRuslan Ermilov 	} else
268fb9aaba0SRuslan Ermilov 		udpstat.udps_nosum++;
269df8bae1dSRodney W. Grimes 
2700b4ae859SGleb Smirnoff #ifdef IPFIREWALL_FORWARD
2710b4ae859SGleb Smirnoff 	/* Grab info from PACKET_TAG_IPFORWARD tag prepended to the chain. */
2720b4ae859SGleb Smirnoff 	fwd_tag = m_tag_find(m, PACKET_TAG_IPFORWARD, NULL);
2730b4ae859SGleb Smirnoff 
2740b4ae859SGleb Smirnoff 	if (fwd_tag != NULL) {
2750b4ae859SGleb Smirnoff 		struct sockaddr_in *next_hop;
2760b4ae859SGleb Smirnoff 
2770b4ae859SGleb Smirnoff 		/* Do the hack. */
2780b4ae859SGleb Smirnoff 		next_hop = (struct sockaddr_in *)(fwd_tag + 1);
2790b4ae859SGleb Smirnoff 		ip->ip_dst = next_hop->sin_addr;
2800b4ae859SGleb Smirnoff 		uh->uh_dport = ntohs(next_hop->sin_port);
2810b4ae859SGleb Smirnoff 		/* Remove the tag from the packet.  We don't need it anymore. */
2820b4ae859SGleb Smirnoff 		m_tag_delete(m, fwd_tag);
2830b4ae859SGleb Smirnoff 	}
2840b4ae859SGleb Smirnoff #endif
2850b4ae859SGleb Smirnoff 
286f76fcf6dSJeffrey Hsu 	INP_INFO_RLOCK(&udbinfo);
287f76fcf6dSJeffrey Hsu 
288df8bae1dSRodney W. Grimes 	if (IN_MULTICAST(ntohl(ip->ip_dst.s_addr)) ||
289df8bae1dSRodney W. Grimes 	    in_broadcast(ip->ip_dst, m->m_pkthdr.rcvif)) {
29082c23ebaSBill Fenner 		struct inpcb *last;
291df8bae1dSRodney W. Grimes 		/*
292df8bae1dSRodney W. Grimes 		 * Deliver a multicast or broadcast datagram to *all* sockets
293df8bae1dSRodney W. Grimes 		 * for which the local and remote addresses and ports match
294df8bae1dSRodney W. Grimes 		 * those of the incoming datagram.  This allows more than
295df8bae1dSRodney W. Grimes 		 * one process to receive multi/broadcasts on the same port.
296df8bae1dSRodney W. Grimes 		 * (This really ought to be done for unicast datagrams as
297df8bae1dSRodney W. Grimes 		 * well, but that would cause problems with existing
298df8bae1dSRodney W. Grimes 		 * applications that open both address-specific sockets and
299df8bae1dSRodney W. Grimes 		 * a wildcard socket listening to the same port -- they would
300df8bae1dSRodney W. Grimes 		 * end up receiving duplicates of every unicast datagram.
301df8bae1dSRodney W. Grimes 		 * Those applications open the multiple sockets to overcome an
302df8bae1dSRodney W. Grimes 		 * inadequacy of the UDP socket interface, but for backwards
303df8bae1dSRodney W. Grimes 		 * compatibility we avoid the problem here rather than
304df8bae1dSRodney W. Grimes 		 * fixing the interface.  Maybe 4.5BSD will remedy this?)
305df8bae1dSRodney W. Grimes 		 */
306df8bae1dSRodney W. Grimes 
307df8bae1dSRodney W. Grimes 		/*
308df8bae1dSRodney W. Grimes 		 * Locate pcb(s) for datagram.
309df8bae1dSRodney W. Grimes 		 * (Algorithm copied from raw_intr().)
310df8bae1dSRodney W. Grimes 		 */
311df8bae1dSRodney W. Grimes 		last = NULL;
312cfa1ca9dSYoshinobu Inoue 		LIST_FOREACH(inp, &udb, inp_list) {
3139c1df695SRobert Watson 			if (inp->inp_lport != uh->uh_dport)
314f76fcf6dSJeffrey Hsu 				continue;
315cfa1ca9dSYoshinobu Inoue #ifdef INET6
316369dc8ceSEivind Eklund 			if ((inp->inp_vflag & INP_IPV4) == 0)
3179c1df695SRobert Watson 				continue;
318cfa1ca9dSYoshinobu Inoue #endif
319df8bae1dSRodney W. Grimes 			if (inp->inp_laddr.s_addr != INADDR_ANY) {
320f76fcf6dSJeffrey Hsu 				if (inp->inp_laddr.s_addr != ip->ip_dst.s_addr)
3219c1df695SRobert Watson 					continue;
322df8bae1dSRodney W. Grimes 			}
323df8bae1dSRodney W. Grimes 			if (inp->inp_faddr.s_addr != INADDR_ANY) {
324df8bae1dSRodney W. Grimes 				if (inp->inp_faddr.s_addr !=
325df8bae1dSRodney W. Grimes 				    ip->ip_src.s_addr ||
326df8bae1dSRodney W. Grimes 				    inp->inp_fport != uh->uh_sport)
3279c1df695SRobert Watson 					continue;
328df8bae1dSRodney W. Grimes 			}
3299c1df695SRobert Watson 			INP_LOCK(inp);
330df8bae1dSRodney W. Grimes 
33183453a06SBruce M Simpson 			/*
33283453a06SBruce M Simpson 			 * Check multicast packets to make sure they are only
33383453a06SBruce M Simpson 			 * sent to sockets with multicast memberships for the
33483453a06SBruce M Simpson 			 * packet's destination address and arrival interface
33583453a06SBruce M Simpson 			 */
33683453a06SBruce M Simpson #define MSHIP(_inp, n) ((_inp)->inp_moptions->imo_membership[(n)])
33783453a06SBruce M Simpson #define NMSHIPS(_inp) ((_inp)->inp_moptions->imo_num_memberships)
33883453a06SBruce M Simpson 			if (strict_mcast_mship && inp->inp_moptions != NULL) {
33983453a06SBruce M Simpson 				int mship, foundmship = 0;
34083453a06SBruce M Simpson 
34183453a06SBruce M Simpson 				for (mship = 0; mship < NMSHIPS(inp); mship++) {
34283453a06SBruce M Simpson 					if (MSHIP(inp, mship)->inm_addr.s_addr
34383453a06SBruce M Simpson 					    == ip->ip_dst.s_addr &&
34483453a06SBruce M Simpson 					    MSHIP(inp, mship)->inm_ifp
34583453a06SBruce M Simpson 					    == m->m_pkthdr.rcvif) {
34683453a06SBruce M Simpson 						foundmship = 1;
34783453a06SBruce M Simpson 						break;
34883453a06SBruce M Simpson 					}
34983453a06SBruce M Simpson 				}
3509c1df695SRobert Watson 				if (foundmship == 0) {
3519c1df695SRobert Watson 					INP_UNLOCK(inp);
3529c1df695SRobert Watson 					continue;
3539c1df695SRobert Watson 				}
35483453a06SBruce M Simpson 			}
35583453a06SBruce M Simpson #undef NMSHIPS
35683453a06SBruce M Simpson #undef MSHIP
357df8bae1dSRodney W. Grimes 			if (last != NULL) {
358df8bae1dSRodney W. Grimes 				struct mbuf *n;
359df8bae1dSRodney W. Grimes 
360032dcc76SLuigi Rizzo 				n = m_copy(m, 0, M_COPYALL);
361365433d9SRobert Watson 				if (n != NULL)
362cfa1ca9dSYoshinobu Inoue 					udp_append(last, ip, n,
363cfa1ca9dSYoshinobu Inoue 						   iphlen +
364d4b509bdSRobert Watson 						   sizeof(struct udphdr),
365d4b509bdSRobert Watson 						   &udp_in);
366f76fcf6dSJeffrey Hsu 				INP_UNLOCK(last);
367df8bae1dSRodney W. Grimes 			}
36882c23ebaSBill Fenner 			last = inp;
369df8bae1dSRodney W. Grimes 			/*
370df8bae1dSRodney W. Grimes 			 * Don't look for additional matches if this one does
371df8bae1dSRodney W. Grimes 			 * not have either the SO_REUSEPORT or SO_REUSEADDR
372df8bae1dSRodney W. Grimes 			 * socket options set.  This heuristic avoids searching
373df8bae1dSRodney W. Grimes 			 * through all pcbs in the common case of a non-shared
374d438d815SThomas Quinot 			 * port.  It assumes that an application will never
375df8bae1dSRodney W. Grimes 			 * clear these options after setting them.
376df8bae1dSRodney W. Grimes 			 */
3774cc20ab1SSeigo Tanimura 			if ((last->inp_socket->so_options&(SO_REUSEPORT|SO_REUSEADDR)) == 0)
378df8bae1dSRodney W. Grimes 				break;
379df8bae1dSRodney W. Grimes 		}
380df8bae1dSRodney W. Grimes 
381df8bae1dSRodney W. Grimes 		if (last == NULL) {
382df8bae1dSRodney W. Grimes 			/*
383df8bae1dSRodney W. Grimes 			 * No matching pcb found; discard datagram.
384df8bae1dSRodney W. Grimes 			 * (No need to send an ICMP Port Unreachable
385df8bae1dSRodney W. Grimes 			 * for a broadcast or multicast datgram.)
386df8bae1dSRodney W. Grimes 			 */
387df8bae1dSRodney W. Grimes 			udpstat.udps_noportbcast++;
38861ffc0b1SJeffrey Hsu 			goto badheadlocked;
389df8bae1dSRodney W. Grimes 		}
390d4b509bdSRobert Watson 		udp_append(last, ip, m, iphlen + sizeof(struct udphdr),
391d4b509bdSRobert Watson 		    &udp_in);
3929b657230SSam Leffler 		INP_UNLOCK(last);
3936b8e5a98SRobert Watson 		INP_INFO_RUNLOCK(&udbinfo);
394df8bae1dSRodney W. Grimes 		return;
395df8bae1dSRodney W. Grimes 	}
396df8bae1dSRodney W. Grimes 	/*
3976d6a026bSDavid Greenman 	 * Locate pcb for datagram.
398df8bae1dSRodney W. Grimes 	 */
399c3229e05SDavid Greenman 	inp = in_pcblookup_hash(&udbinfo, ip->ip_src, uh->uh_sport,
400cfa1ca9dSYoshinobu Inoue 	    ip->ip_dst, uh->uh_dport, 1, m->m_pkthdr.rcvif);
40115bd2b43SDavid Greenman 	if (inp == NULL) {
40275cfc95fSAndrey A. Chernov 		if (log_in_vain) {
403df5c0b8aSBill Fenner 			char buf[4*sizeof "123"];
40475cfc95fSAndrey A. Chernov 
40575cfc95fSAndrey A. Chernov 			strcpy(buf, inet_ntoa(ip->ip_dst));
406592071e8SBruce Evans 			log(LOG_INFO,
407592071e8SBruce Evans 			    "Connection attempt to UDP %s:%d from %s:%d\n",
408592071e8SBruce Evans 			    buf, ntohs(uh->uh_dport), inet_ntoa(ip->ip_src),
409592071e8SBruce Evans 			    ntohs(uh->uh_sport));
41075cfc95fSAndrey A. Chernov 		}
411df8bae1dSRodney W. Grimes 		udpstat.udps_noport++;
412df8bae1dSRodney W. Grimes 		if (m->m_flags & (M_BCAST | M_MCAST)) {
413df8bae1dSRodney W. Grimes 			udpstat.udps_noportbcast++;
41461ffc0b1SJeffrey Hsu 			goto badheadlocked;
415df8bae1dSRodney W. Grimes 		}
416582a7760SBruce Evans 		if (blackhole)
41761ffc0b1SJeffrey Hsu 			goto badheadlocked;
4181cbd978eSLuigi Rizzo 		if (badport_bandlim(BANDLIM_ICMP_UNREACH) < 0)
4191cbd978eSLuigi Rizzo 			goto badheadlocked;
42004287599SRuslan Ermilov 		*ip = save_ip;
42104287599SRuslan Ermilov 		ip->ip_len += iphlen;
422582a7760SBruce Evans 		icmp_error(m, ICMP_UNREACH, ICMP_UNREACH_PORT, 0, 0);
423f76fcf6dSJeffrey Hsu 		INP_INFO_RUNLOCK(&udbinfo);
424df8bae1dSRodney W. Grimes 		return;
425df8bae1dSRodney W. Grimes 	}
42661ffc0b1SJeffrey Hsu 	INP_LOCK(inp);
427936cd18dSAndre Oppermann 	/* Check the minimum TTL for socket. */
428936cd18dSAndre Oppermann 	if (inp->inp_ip_minttl && inp->inp_ip_minttl > ip->ip_ttl)
429936cd18dSAndre Oppermann 		goto badheadlocked;
430d4b509bdSRobert Watson 	udp_append(inp, ip, m, iphlen + sizeof(struct udphdr), &udp_in);
431f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
4326b8e5a98SRobert Watson 	INP_INFO_RUNLOCK(&udbinfo);
433df8bae1dSRodney W. Grimes 	return;
43461ffc0b1SJeffrey Hsu 
43561ffc0b1SJeffrey Hsu badheadlocked:
436f76fcf6dSJeffrey Hsu 	if (inp)
437f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
4386b8e5a98SRobert Watson 	INP_INFO_RUNLOCK(&udbinfo);
439f76fcf6dSJeffrey Hsu badunlocked:
440df8bae1dSRodney W. Grimes 	m_freem(m);
441cfa1ca9dSYoshinobu Inoue 	return;
442cfa1ca9dSYoshinobu Inoue }
443cfa1ca9dSYoshinobu Inoue 
444cfa1ca9dSYoshinobu Inoue /*
445d4b509bdSRobert Watson  * Subroutine of udp_input(), which appends the provided mbuf chain to the
446d4b509bdSRobert Watson  * passed pcb/socket.  The caller must provide a sockaddr_in via udp_in that
447d4b509bdSRobert Watson  * contains the source address.  If the socket ends up being an IPv6 socket,
448d4b509bdSRobert Watson  * udp_append() will convert to a sockaddr_in6 before passing the address
449d4b509bdSRobert Watson  * into the socket code.
450cfa1ca9dSYoshinobu Inoue  */
451cfa1ca9dSYoshinobu Inoue static void
4528e3f3b16SRobert Watson udp_append(inp, ip, n, off, udp_in)
4538e3f3b16SRobert Watson 	struct inpcb *inp;
454032dcc76SLuigi Rizzo 	struct ip *ip;
455032dcc76SLuigi Rizzo 	struct mbuf *n;
456032dcc76SLuigi Rizzo 	int off;
457d4b509bdSRobert Watson 	struct sockaddr_in *udp_in;
458cfa1ca9dSYoshinobu Inoue {
459cfa1ca9dSYoshinobu Inoue 	struct sockaddr *append_sa;
4601e4d7da7SRobert Watson 	struct socket *so;
461cfa1ca9dSYoshinobu Inoue 	struct mbuf *opts = 0;
462c83c1318SPoul-Henning Kamp #ifdef INET6
463d4b509bdSRobert Watson 	struct sockaddr_in6 udp_in6;
464c83c1318SPoul-Henning Kamp #endif
465cfa1ca9dSYoshinobu Inoue 
4668e3f3b16SRobert Watson 	INP_LOCK_ASSERT(inp);
46787f2bb8cSRobert Watson 
468da0f4099SHajimu UMEMOTO #if defined(IPSEC) || defined(FAST_IPSEC)
469da0f4099SHajimu UMEMOTO 	/* check AH/ESP integrity. */
4708e3f3b16SRobert Watson 	if (ipsec4_in_reject(n, inp)) {
471b9234fafSSam Leffler #ifdef IPSEC
472b9234fafSSam Leffler 		ipsecstat.in_polvio++;
473b9234fafSSam Leffler #endif /*IPSEC*/
474b9234fafSSam Leffler 		m_freem(n);
475b9234fafSSam Leffler 		return;
476b9234fafSSam Leffler 	}
477da0f4099SHajimu UMEMOTO #endif /*IPSEC || FAST_IPSEC*/
478b9234fafSSam Leffler #ifdef MAC
4798e3f3b16SRobert Watson 	if (mac_check_inpcb_deliver(inp, n) != 0) {
480b9234fafSSam Leffler 		m_freem(n);
481b9234fafSSam Leffler 		return;
482b9234fafSSam Leffler 	}
483b9234fafSSam Leffler #endif
4848e3f3b16SRobert Watson 	if (inp->inp_flags & INP_CONTROLOPTS ||
4858e3f3b16SRobert Watson 	    inp->inp_socket->so_options & (SO_TIMESTAMP | SO_BINTIME)) {
486cfa1ca9dSYoshinobu Inoue #ifdef INET6
4878e3f3b16SRobert Watson 		if (inp->inp_vflag & INP_IPV6) {
488cfa1ca9dSYoshinobu Inoue 			int savedflags;
489cfa1ca9dSYoshinobu Inoue 
4908e3f3b16SRobert Watson 			savedflags = inp->inp_flags;
4918e3f3b16SRobert Watson 			inp->inp_flags &= ~INP_UNMAPPABLEOPTS;
4928e3f3b16SRobert Watson 			ip6_savecontrol(inp, n, &opts);
4938e3f3b16SRobert Watson 			inp->inp_flags = savedflags;
494cfa1ca9dSYoshinobu Inoue 		} else
495cfa1ca9dSYoshinobu Inoue #endif
4968e3f3b16SRobert Watson 		ip_savecontrol(inp, &opts, ip, n);
4974cc20ab1SSeigo Tanimura 	}
498cfa1ca9dSYoshinobu Inoue #ifdef INET6
4998e3f3b16SRobert Watson 	if (inp->inp_vflag & INP_IPV6) {
500d4b509bdSRobert Watson 		bzero(&udp_in6, sizeof(udp_in6));
501d4b509bdSRobert Watson 		udp_in6.sin6_len = sizeof(udp_in6);
502d4b509bdSRobert Watson 		udp_in6.sin6_family = AF_INET6;
503d4b509bdSRobert Watson 		in6_sin_2_v4mapsin6(udp_in, &udp_in6);
504d4b509bdSRobert Watson 		append_sa = (struct sockaddr *)&udp_in6;
505cfa1ca9dSYoshinobu Inoue 	} else
506cfa1ca9dSYoshinobu Inoue #endif
507d4b509bdSRobert Watson 	append_sa = (struct sockaddr *)udp_in;
508cfa1ca9dSYoshinobu Inoue 	m_adj(n, off);
5091e4d7da7SRobert Watson 
5108e3f3b16SRobert Watson 	so = inp->inp_socket;
5111e4d7da7SRobert Watson 	SOCKBUF_LOCK(&so->so_rcv);
5121e4d7da7SRobert Watson 	if (sbappendaddr_locked(&so->so_rcv, append_sa, n, opts) == 0) {
513cfa1ca9dSYoshinobu Inoue 		m_freem(n);
514cfa1ca9dSYoshinobu Inoue 		if (opts)
515cfa1ca9dSYoshinobu Inoue 			m_freem(opts);
516cfa1ca9dSYoshinobu Inoue 		udpstat.udps_fullsock++;
5171e4d7da7SRobert Watson 		SOCKBUF_UNLOCK(&so->so_rcv);
5184cc20ab1SSeigo Tanimura 	} else
5191e4d7da7SRobert Watson 		sorwakeup_locked(so);
520df8bae1dSRodney W. Grimes }
521df8bae1dSRodney W. Grimes 
522df8bae1dSRodney W. Grimes /*
523df8bae1dSRodney W. Grimes  * Notify a udp user of an asynchronous error;
524df8bae1dSRodney W. Grimes  * just wake up so that he can collect error status.
525df8bae1dSRodney W. Grimes  */
5263ce144eaSJeffrey Hsu struct inpcb *
527032dcc76SLuigi Rizzo udp_notify(inp, errno)
528032dcc76SLuigi Rizzo 	register struct inpcb *inp;
529032dcc76SLuigi Rizzo 	int errno;
530df8bae1dSRodney W. Grimes {
531df8bae1dSRodney W. Grimes 	inp->inp_socket->so_error = errno;
532df8bae1dSRodney W. Grimes 	sorwakeup(inp->inp_socket);
533df8bae1dSRodney W. Grimes 	sowwakeup(inp->inp_socket);
5343ce144eaSJeffrey Hsu 	return inp;
535df8bae1dSRodney W. Grimes }
536df8bae1dSRodney W. Grimes 
537df8bae1dSRodney W. Grimes void
538032dcc76SLuigi Rizzo udp_ctlinput(cmd, sa, vip)
539032dcc76SLuigi Rizzo 	int cmd;
540032dcc76SLuigi Rizzo 	struct sockaddr *sa;
541032dcc76SLuigi Rizzo 	void *vip;
542df8bae1dSRodney W. Grimes {
543c693a045SJonathan Lemon 	struct ip *ip = vip;
544c693a045SJonathan Lemon 	struct udphdr *uh;
5453ce144eaSJeffrey Hsu 	struct inpcb *(*notify)(struct inpcb *, int) = udp_notify;
546c693a045SJonathan Lemon 	struct in_addr faddr;
547c693a045SJonathan Lemon 	struct inpcb *inp;
548c693a045SJonathan Lemon 
549c693a045SJonathan Lemon 	faddr = ((struct sockaddr_in *)sa)->sin_addr;
550c693a045SJonathan Lemon 	if (sa->sa_family != AF_INET || faddr.s_addr == INADDR_ANY)
551c693a045SJonathan Lemon 		return;
552df8bae1dSRodney W. Grimes 
55397d8d152SAndre Oppermann 	/*
55497d8d152SAndre Oppermann 	 * Redirects don't need to be handled up here.
55597d8d152SAndre Oppermann 	 */
55697d8d152SAndre Oppermann 	if (PRC_IS_REDIRECT(cmd))
55797d8d152SAndre Oppermann 		return;
55897d8d152SAndre Oppermann 	/*
55997d8d152SAndre Oppermann 	 * Hostdead is ugly because it goes linearly through all PCBs.
56097d8d152SAndre Oppermann 	 * XXX: We never get this from ICMP, otherwise it makes an
56197d8d152SAndre Oppermann 	 * excellent DoS attack on machines with many connections.
56297d8d152SAndre Oppermann 	 */
56397d8d152SAndre Oppermann 	if (cmd == PRC_HOSTDEAD)
564d1c54148SJesper Skriver 		ip = 0;
565d1c54148SJesper Skriver 	else if ((unsigned)cmd >= PRC_NCMDS || inetctlerrmap[cmd] == 0)
566df8bae1dSRodney W. Grimes 		return;
567df8bae1dSRodney W. Grimes 	if (ip) {
568df8bae1dSRodney W. Grimes 		uh = (struct udphdr *)((caddr_t)ip + (ip->ip_hl << 2));
569f76fcf6dSJeffrey Hsu 		INP_INFO_RLOCK(&udbinfo);
570c693a045SJonathan Lemon 		inp = in_pcblookup_hash(&udbinfo, faddr, uh->uh_dport,
571c693a045SJonathan Lemon 		    ip->ip_src, uh->uh_sport, 0, NULL);
572f76fcf6dSJeffrey Hsu 		if (inp != NULL) {
573f76fcf6dSJeffrey Hsu 			INP_LOCK(inp);
574f76fcf6dSJeffrey Hsu 			if (inp->inp_socket != NULL) {
575c693a045SJonathan Lemon 				(*notify)(inp, inetctlerrmap[cmd]);
576f76fcf6dSJeffrey Hsu 			}
577f76fcf6dSJeffrey Hsu 			INP_UNLOCK(inp);
578f76fcf6dSJeffrey Hsu 		}
579f76fcf6dSJeffrey Hsu 		INP_INFO_RUNLOCK(&udbinfo);
580df8bae1dSRodney W. Grimes 	} else
581f76fcf6dSJeffrey Hsu 		in_pcbnotifyall(&udbinfo, faddr, inetctlerrmap[cmd], notify);
582df8bae1dSRodney W. Grimes }
583df8bae1dSRodney W. Grimes 
5840312fbe9SPoul-Henning Kamp static int
58582d9ae4eSPoul-Henning Kamp udp_pcblist(SYSCTL_HANDLER_ARGS)
58698271db4SGarrett Wollman {
587277afaffSRobert Watson 	int error, i, n;
58898271db4SGarrett Wollman 	struct inpcb *inp, **inp_list;
58998271db4SGarrett Wollman 	inp_gen_t gencnt;
59098271db4SGarrett Wollman 	struct xinpgen xig;
59198271db4SGarrett Wollman 
59298271db4SGarrett Wollman 	/*
59398271db4SGarrett Wollman 	 * The process of preparing the TCB list is too time-consuming and
59498271db4SGarrett Wollman 	 * resource-intensive to repeat twice on every request.
59598271db4SGarrett Wollman 	 */
59698271db4SGarrett Wollman 	if (req->oldptr == 0) {
59798271db4SGarrett Wollman 		n = udbinfo.ipi_count;
59898271db4SGarrett Wollman 		req->oldidx = 2 * (sizeof xig)
59998271db4SGarrett Wollman 			+ (n + n/8) * sizeof(struct xinpcb);
60098271db4SGarrett Wollman 		return 0;
60198271db4SGarrett Wollman 	}
60298271db4SGarrett Wollman 
60398271db4SGarrett Wollman 	if (req->newptr != 0)
60498271db4SGarrett Wollman 		return EPERM;
60598271db4SGarrett Wollman 
60698271db4SGarrett Wollman 	/*
60798271db4SGarrett Wollman 	 * OK, now we're committed to doing something.
60898271db4SGarrett Wollman 	 */
6094b40c56cSJeffrey Hsu 	INP_INFO_RLOCK(&udbinfo);
61098271db4SGarrett Wollman 	gencnt = udbinfo.ipi_gencnt;
61198271db4SGarrett Wollman 	n = udbinfo.ipi_count;
6124b40c56cSJeffrey Hsu 	INP_INFO_RUNLOCK(&udbinfo);
61398271db4SGarrett Wollman 
61447934cefSDon Lewis 	error = sysctl_wire_old_buffer(req, 2 * (sizeof xig)
6155c38b6dbSDon Lewis 		+ n * sizeof(struct xinpcb));
61647934cefSDon Lewis 	if (error != 0)
61747934cefSDon Lewis 		return (error);
6185c38b6dbSDon Lewis 
61998271db4SGarrett Wollman 	xig.xig_len = sizeof xig;
62098271db4SGarrett Wollman 	xig.xig_count = n;
62198271db4SGarrett Wollman 	xig.xig_gen = gencnt;
62298271db4SGarrett Wollman 	xig.xig_sogen = so_gencnt;
62398271db4SGarrett Wollman 	error = SYSCTL_OUT(req, &xig, sizeof xig);
62498271db4SGarrett Wollman 	if (error)
62598271db4SGarrett Wollman 		return error;
62698271db4SGarrett Wollman 
627a163d034SWarner Losh 	inp_list = malloc(n * sizeof *inp_list, M_TEMP, M_WAITOK);
62898271db4SGarrett Wollman 	if (inp_list == 0)
62998271db4SGarrett Wollman 		return ENOMEM;
63098271db4SGarrett Wollman 
631f76fcf6dSJeffrey Hsu 	INP_INFO_RLOCK(&udbinfo);
632fc2ffbe6SPoul-Henning Kamp 	for (inp = LIST_FIRST(udbinfo.listhead), i = 0; inp && i < n;
633fc2ffbe6SPoul-Henning Kamp 	     inp = LIST_NEXT(inp, inp_list)) {
634f76fcf6dSJeffrey Hsu 		INP_LOCK(inp);
6352ded288cSJeffrey Hsu 		if (inp->inp_gencnt <= gencnt &&
6362ded288cSJeffrey Hsu 		    cr_canseesocket(req->td->td_ucred, inp->inp_socket) == 0)
63798271db4SGarrett Wollman 			inp_list[i++] = inp;
638f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
6394787fd37SPaul Saab 	}
640f76fcf6dSJeffrey Hsu 	INP_INFO_RUNLOCK(&udbinfo);
64198271db4SGarrett Wollman 	n = i;
64298271db4SGarrett Wollman 
64398271db4SGarrett Wollman 	error = 0;
64498271db4SGarrett Wollman 	for (i = 0; i < n; i++) {
64598271db4SGarrett Wollman 		inp = inp_list[i];
646d915b280SStephan Uphoff 		INP_LOCK(inp);
64798271db4SGarrett Wollman 		if (inp->inp_gencnt <= gencnt) {
64898271db4SGarrett Wollman 			struct xinpcb xi;
649fd94099eSColin Percival 			bzero(&xi, sizeof(xi));
65098271db4SGarrett Wollman 			xi.xi_len = sizeof xi;
65198271db4SGarrett Wollman 			/* XXX should avoid extra copy */
65298271db4SGarrett Wollman 			bcopy(inp, &xi.xi_inp, sizeof *inp);
65398271db4SGarrett Wollman 			if (inp->inp_socket)
65498271db4SGarrett Wollman 				sotoxsocket(inp->inp_socket, &xi.xi_socket);
6554b40c56cSJeffrey Hsu 			xi.xi_inp.inp_gencnt = inp->inp_gencnt;
656d915b280SStephan Uphoff 			INP_UNLOCK(inp);
65798271db4SGarrett Wollman 			error = SYSCTL_OUT(req, &xi, sizeof xi);
658d915b280SStephan Uphoff 		} else
659d915b280SStephan Uphoff 			INP_UNLOCK(inp);
66098271db4SGarrett Wollman 	}
66198271db4SGarrett Wollman 	if (!error) {
66298271db4SGarrett Wollman 		/*
66398271db4SGarrett Wollman 		 * Give the user an updated idea of our state.
66498271db4SGarrett Wollman 		 * If the generation differs from what we told
66598271db4SGarrett Wollman 		 * her before, she knows that something happened
66698271db4SGarrett Wollman 		 * while we were processing this request, and it
66798271db4SGarrett Wollman 		 * might be necessary to retry.
66898271db4SGarrett Wollman 		 */
669f76fcf6dSJeffrey Hsu 		INP_INFO_RLOCK(&udbinfo);
67098271db4SGarrett Wollman 		xig.xig_gen = udbinfo.ipi_gencnt;
67198271db4SGarrett Wollman 		xig.xig_sogen = so_gencnt;
67298271db4SGarrett Wollman 		xig.xig_count = udbinfo.ipi_count;
673f76fcf6dSJeffrey Hsu 		INP_INFO_RUNLOCK(&udbinfo);
67498271db4SGarrett Wollman 		error = SYSCTL_OUT(req, &xig, sizeof xig);
67598271db4SGarrett Wollman 	}
67698271db4SGarrett Wollman 	free(inp_list, M_TEMP);
67798271db4SGarrett Wollman 	return error;
67898271db4SGarrett Wollman }
67998271db4SGarrett Wollman 
68098271db4SGarrett Wollman SYSCTL_PROC(_net_inet_udp, UDPCTL_PCBLIST, pcblist, CTLFLAG_RD, 0, 0,
68198271db4SGarrett Wollman 	    udp_pcblist, "S,xinpcb", "List of active UDP sockets");
68298271db4SGarrett Wollman 
68398271db4SGarrett Wollman static int
68482d9ae4eSPoul-Henning Kamp udp_getcred(SYSCTL_HANDLER_ARGS)
685490d50b6SBrian Feldman {
686c0511d3bSBrian Feldman 	struct xucred xuc;
687490d50b6SBrian Feldman 	struct sockaddr_in addrs[2];
688490d50b6SBrian Feldman 	struct inpcb *inp;
689277afaffSRobert Watson 	int error;
690490d50b6SBrian Feldman 
691acd3428bSRobert Watson 	error = priv_check_cred(req->td->td_ucred, PRIV_NETINET_GETCRED,
692acd3428bSRobert Watson 	    SUSER_ALLOWJAIL);
693490d50b6SBrian Feldman 	if (error)
694490d50b6SBrian Feldman 		return (error);
695490d50b6SBrian Feldman 	error = SYSCTL_IN(req, addrs, sizeof(addrs));
696490d50b6SBrian Feldman 	if (error)
697490d50b6SBrian Feldman 		return (error);
698f76fcf6dSJeffrey Hsu 	INP_INFO_RLOCK(&udbinfo);
699490d50b6SBrian Feldman 	inp = in_pcblookup_hash(&udbinfo, addrs[1].sin_addr, addrs[1].sin_port,
700cfa1ca9dSYoshinobu Inoue 				addrs[0].sin_addr, addrs[0].sin_port, 1, NULL);
7012d20c83fSDon Lewis 	if (inp == NULL || inp->inp_socket == NULL) {
702490d50b6SBrian Feldman 		error = ENOENT;
703490d50b6SBrian Feldman 		goto out;
704490d50b6SBrian Feldman 	}
70529dc1288SRobert Watson 	error = cr_canseesocket(req->td->td_ucred, inp->inp_socket);
7067ce87f12SDavid Malone 	if (error)
7077ce87f12SDavid Malone 		goto out;
70876183f34SDima Dorfman 	cru2x(inp->inp_socket->so_cred, &xuc);
709490d50b6SBrian Feldman out:
710f76fcf6dSJeffrey Hsu 	INP_INFO_RUNLOCK(&udbinfo);
7110e1eebb8SDon Lewis 	if (error == 0)
7120e1eebb8SDon Lewis 		error = SYSCTL_OUT(req, &xuc, sizeof(struct xucred));
713490d50b6SBrian Feldman 	return (error);
714490d50b6SBrian Feldman }
715490d50b6SBrian Feldman 
7167ce87f12SDavid Malone SYSCTL_PROC(_net_inet_udp, OID_AUTO, getcred,
7177ce87f12SDavid Malone     CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_PRISON, 0, 0,
7187ce87f12SDavid Malone     udp_getcred, "S,xucred", "Get the xucred of a UDP connection");
719490d50b6SBrian Feldman 
720490d50b6SBrian Feldman static int
721032dcc76SLuigi Rizzo udp_output(inp, m, addr, control, td)
722032dcc76SLuigi Rizzo 	register struct inpcb *inp;
723032dcc76SLuigi Rizzo 	struct mbuf *m;
724032dcc76SLuigi Rizzo 	struct sockaddr *addr;
725032dcc76SLuigi Rizzo 	struct mbuf *control;
726032dcc76SLuigi Rizzo 	struct thread *td;
727df8bae1dSRodney W. Grimes {
728032dcc76SLuigi Rizzo 	register struct udpiphdr *ui;
729032dcc76SLuigi Rizzo 	register int len = m->m_pkthdr.len;
73090162a4eSIan Dowse 	struct in_addr faddr, laddr;
731c557ae16SIan Dowse 	struct cmsghdr *cm;
732c557ae16SIan Dowse 	struct sockaddr_in *sin, src;
73390162a4eSIan Dowse 	int error = 0;
7348afa2304SBruce M Simpson 	int ipflags;
73590162a4eSIan Dowse 	u_short fport, lport;
7365c32ea65SRobert Watson 	int unlock_udbinfo;
737df8bae1dSRodney W. Grimes 
7385c32ea65SRobert Watson 	/*
7395c32ea65SRobert Watson 	 * udp_output() may need to temporarily bind or connect the current
7405c32ea65SRobert Watson 	 * inpcb.  As such, we don't know up front what inpcb locks we will
7415c32ea65SRobert Watson 	 * need.  Do any work to decide what is needed up front before
7425c32ea65SRobert Watson 	 * acquiring locks.
7435c32ea65SRobert Watson 	 */
744430d30d8SBill Fenner 	if (len + sizeof(struct udpiphdr) > IP_MAXPACKET) {
745c557ae16SIan Dowse 		if (control)
746c557ae16SIan Dowse 			m_freem(control);
7475c32ea65SRobert Watson 		m_freem(m);
7485c32ea65SRobert Watson 		return EMSGSIZE;
749430d30d8SBill Fenner 	}
750430d30d8SBill Fenner 
751c557ae16SIan Dowse 	src.sin_addr.s_addr = INADDR_ANY;
752c557ae16SIan Dowse 	if (control != NULL) {
753c557ae16SIan Dowse 		/*
754c557ae16SIan Dowse 		 * XXX: Currently, we assume all the optional information
755c557ae16SIan Dowse 		 * is stored in a single mbuf.
756c557ae16SIan Dowse 		 */
757c557ae16SIan Dowse 		if (control->m_next) {
758c557ae16SIan Dowse 			m_freem(control);
7595c32ea65SRobert Watson 			m_freem(m);
7605c32ea65SRobert Watson 			return EINVAL;
761c557ae16SIan Dowse 		}
762c557ae16SIan Dowse 		for (; control->m_len > 0;
763c557ae16SIan Dowse 		    control->m_data += CMSG_ALIGN(cm->cmsg_len),
764c557ae16SIan Dowse 		    control->m_len -= CMSG_ALIGN(cm->cmsg_len)) {
765c557ae16SIan Dowse 			cm = mtod(control, struct cmsghdr *);
766c557ae16SIan Dowse 			if (control->m_len < sizeof(*cm) || cm->cmsg_len == 0 ||
767c557ae16SIan Dowse 			    cm->cmsg_len > control->m_len) {
768c557ae16SIan Dowse 				error = EINVAL;
769c557ae16SIan Dowse 				break;
770c557ae16SIan Dowse 			}
771c557ae16SIan Dowse 			if (cm->cmsg_level != IPPROTO_IP)
772c557ae16SIan Dowse 				continue;
773c557ae16SIan Dowse 
774c557ae16SIan Dowse 			switch (cm->cmsg_type) {
775c557ae16SIan Dowse 			case IP_SENDSRCADDR:
776c557ae16SIan Dowse 				if (cm->cmsg_len !=
777c557ae16SIan Dowse 				    CMSG_LEN(sizeof(struct in_addr))) {
778c557ae16SIan Dowse 					error = EINVAL;
779c557ae16SIan Dowse 					break;
780c557ae16SIan Dowse 				}
781c557ae16SIan Dowse 				bzero(&src, sizeof(src));
782c557ae16SIan Dowse 				src.sin_family = AF_INET;
783c557ae16SIan Dowse 				src.sin_len = sizeof(src);
784c557ae16SIan Dowse 				src.sin_port = inp->inp_lport;
785c557ae16SIan Dowse 				src.sin_addr = *(struct in_addr *)CMSG_DATA(cm);
786c557ae16SIan Dowse 				break;
787c557ae16SIan Dowse 			default:
788c557ae16SIan Dowse 				error = ENOPROTOOPT;
789c557ae16SIan Dowse 				break;
790c557ae16SIan Dowse 			}
791c557ae16SIan Dowse 			if (error)
792c557ae16SIan Dowse 				break;
793c557ae16SIan Dowse 		}
794c557ae16SIan Dowse 		m_freem(control);
795c557ae16SIan Dowse 	}
7965c32ea65SRobert Watson 	if (error) {
7975c32ea65SRobert Watson 		m_freem(m);
7985c32ea65SRobert Watson 		return error;
7995c32ea65SRobert Watson 	}
8005c32ea65SRobert Watson 
8015c32ea65SRobert Watson 	if (src.sin_addr.s_addr != INADDR_ANY ||
8025c32ea65SRobert Watson 	    addr != NULL) {
8035c32ea65SRobert Watson 		INP_INFO_WLOCK(&udbinfo);
8045c32ea65SRobert Watson 		unlock_udbinfo = 1;
8055c32ea65SRobert Watson 	} else
8065c32ea65SRobert Watson 		unlock_udbinfo = 0;
8075c32ea65SRobert Watson 	INP_LOCK(inp);
8085c32ea65SRobert Watson 
8095c32ea65SRobert Watson #ifdef MAC
8105c32ea65SRobert Watson 	mac_create_mbuf_from_inpcb(inp, m);
8115c32ea65SRobert Watson #endif
8125c32ea65SRobert Watson 
81390162a4eSIan Dowse 	laddr = inp->inp_laddr;
81490162a4eSIan Dowse 	lport = inp->inp_lport;
815c557ae16SIan Dowse 	if (src.sin_addr.s_addr != INADDR_ANY) {
816c557ae16SIan Dowse 		if (lport == 0) {
817c557ae16SIan Dowse 			error = EINVAL;
818c557ae16SIan Dowse 			goto release;
819c557ae16SIan Dowse 		}
820c557ae16SIan Dowse 		error = in_pcbbind_setup(inp, (struct sockaddr *)&src,
821b0330ed9SPawel Jakub Dawidek 		    &laddr.s_addr, &lport, td->td_ucred);
822c557ae16SIan Dowse 		if (error)
823c557ae16SIan Dowse 			goto release;
824c557ae16SIan Dowse 	}
825c557ae16SIan Dowse 
826df8bae1dSRodney W. Grimes 	if (addr) {
82775c13541SPoul-Henning Kamp 		sin = (struct sockaddr_in *)addr;
828812d8653SSam Leffler 		if (jailed(td->td_ucred))
829a854ed98SJohn Baldwin 			prison_remote_ip(td->td_ucred, 0, &sin->sin_addr.s_addr);
830df8bae1dSRodney W. Grimes 		if (inp->inp_faddr.s_addr != INADDR_ANY) {
831df8bae1dSRodney W. Grimes 			error = EISCONN;
832df8bae1dSRodney W. Grimes 			goto release;
833df8bae1dSRodney W. Grimes 		}
83490162a4eSIan Dowse 		error = in_pcbconnect_setup(inp, addr, &laddr.s_addr, &lport,
835b0330ed9SPawel Jakub Dawidek 		    &faddr.s_addr, &fport, NULL, td->td_ucred);
83690162a4eSIan Dowse 		if (error)
83790162a4eSIan Dowse 			goto release;
83890162a4eSIan Dowse 
83990162a4eSIan Dowse 		/* Commit the local port if newly assigned. */
84090162a4eSIan Dowse 		if (inp->inp_laddr.s_addr == INADDR_ANY &&
84190162a4eSIan Dowse 		    inp->inp_lport == 0) {
8423a1757b9SGleb Smirnoff 			/*
8433a1757b9SGleb Smirnoff 			 * Remember addr if jailed, to prevent rebinding.
8443a1757b9SGleb Smirnoff 			 */
8453a1757b9SGleb Smirnoff 			if (jailed(td->td_ucred))
8463a1757b9SGleb Smirnoff 				inp->inp_laddr = laddr;
84790162a4eSIan Dowse 			inp->inp_lport = lport;
84890162a4eSIan Dowse 			if (in_pcbinshash(inp) != 0) {
84990162a4eSIan Dowse 				inp->inp_lport = 0;
85090162a4eSIan Dowse 				error = EAGAIN;
851df8bae1dSRodney W. Grimes 				goto release;
852df8bae1dSRodney W. Grimes 			}
85390162a4eSIan Dowse 			inp->inp_flags |= INP_ANONPORT;
85490162a4eSIan Dowse 		}
855df8bae1dSRodney W. Grimes 	} else {
85690162a4eSIan Dowse 		faddr = inp->inp_faddr;
85790162a4eSIan Dowse 		fport = inp->inp_fport;
85890162a4eSIan Dowse 		if (faddr.s_addr == INADDR_ANY) {
859df8bae1dSRodney W. Grimes 			error = ENOTCONN;
860df8bae1dSRodney W. Grimes 			goto release;
861df8bae1dSRodney W. Grimes 		}
862df8bae1dSRodney W. Grimes 	}
863e6ccd709SRobert Watson 
864df8bae1dSRodney W. Grimes 	/*
865e6ccd709SRobert Watson 	 * Calculate data length and get a mbuf for UDP, IP, and possible
866392e8407SRobert Watson 	 * link-layer headers.  Immediate slide the data pointer back forward
867392e8407SRobert Watson 	 * since we won't use that space at this layer.
868df8bae1dSRodney W. Grimes 	 */
869e6ccd709SRobert Watson 	M_PREPEND(m, sizeof(struct udpiphdr) + max_linkhdr, M_DONTWAIT);
870e6ccd709SRobert Watson 	if (m == NULL) {
871df8bae1dSRodney W. Grimes 		error = ENOBUFS;
87249b19bfcSBruce M Simpson 		goto release;
873df8bae1dSRodney W. Grimes 	}
874e6ccd709SRobert Watson 	m->m_data += max_linkhdr;
875e6ccd709SRobert Watson 	m->m_len -= max_linkhdr;
876392e8407SRobert Watson 	m->m_pkthdr.len -= max_linkhdr;
877df8bae1dSRodney W. Grimes 
878df8bae1dSRodney W. Grimes 	/*
879df8bae1dSRodney W. Grimes 	 * Fill in mbuf with extended UDP header
880df8bae1dSRodney W. Grimes 	 * and addresses and length put into network format.
881df8bae1dSRodney W. Grimes 	 */
882df8bae1dSRodney W. Grimes 	ui = mtod(m, struct udpiphdr *);
883db4f9cc7SJonathan Lemon 	bzero(ui->ui_x1, sizeof(ui->ui_x1));	/* XXX still needed? */
884df8bae1dSRodney W. Grimes 	ui->ui_pr = IPPROTO_UDP;
88590162a4eSIan Dowse 	ui->ui_src = laddr;
88690162a4eSIan Dowse 	ui->ui_dst = faddr;
88790162a4eSIan Dowse 	ui->ui_sport = lport;
88890162a4eSIan Dowse 	ui->ui_dport = fport;
889db4f9cc7SJonathan Lemon 	ui->ui_ulen = htons((u_short)len + sizeof(struct udphdr));
890df8bae1dSRodney W. Grimes 
891b2828ad2SAndre Oppermann 	/*
892b2828ad2SAndre Oppermann 	 * Set the Don't Fragment bit in the IP header.
893b2828ad2SAndre Oppermann 	 */
894b2828ad2SAndre Oppermann 	if (inp->inp_flags & INP_DONTFRAG) {
895b2828ad2SAndre Oppermann 		struct ip *ip;
896b2828ad2SAndre Oppermann 		ip = (struct ip *)&ui->ui_i;
897b2828ad2SAndre Oppermann 		ip->ip_off |= IP_DF;
898b2828ad2SAndre Oppermann 	}
899b2828ad2SAndre Oppermann 
900b5d47ff5SJohn-Mark Gurney 	ipflags = 0;
901b5d47ff5SJohn-Mark Gurney 	if (inp->inp_socket->so_options & SO_DONTROUTE)
902b5d47ff5SJohn-Mark Gurney 		ipflags |= IP_ROUTETOIF;
903b5d47ff5SJohn-Mark Gurney 	if (inp->inp_socket->so_options & SO_BROADCAST)
904b5d47ff5SJohn-Mark Gurney 		ipflags |= IP_ALLOWBROADCAST;
9056fbfd582SAndre Oppermann 	if (inp->inp_flags & INP_ONESBCAST)
9068afa2304SBruce M Simpson 		ipflags |= IP_SENDONES;
9078afa2304SBruce M Simpson 
908df8bae1dSRodney W. Grimes 	/*
909db4f9cc7SJonathan Lemon 	 * Set up checksum and output datagram.
910df8bae1dSRodney W. Grimes 	 */
911df8bae1dSRodney W. Grimes 	if (udpcksum) {
9126fbfd582SAndre Oppermann 		if (inp->inp_flags & INP_ONESBCAST)
9138a538743SBruce M Simpson 			faddr.s_addr = INADDR_BROADCAST;
9148a538743SBruce M Simpson 		ui->ui_sum = in_pseudo(ui->ui_src.s_addr, faddr.s_addr,
915db4f9cc7SJonathan Lemon 		    htons((u_short)len + sizeof(struct udphdr) + IPPROTO_UDP));
916db4f9cc7SJonathan Lemon 		m->m_pkthdr.csum_flags = CSUM_UDP;
917db4f9cc7SJonathan Lemon 		m->m_pkthdr.csum_data = offsetof(struct udphdr, uh_sum);
918db4f9cc7SJonathan Lemon 	} else {
919db4f9cc7SJonathan Lemon 		ui->ui_sum = 0;
920df8bae1dSRodney W. Grimes 	}
921df8bae1dSRodney W. Grimes 	((struct ip *)ui)->ip_len = sizeof (struct udpiphdr) + len;
922ca98b82cSDavid Greenman 	((struct ip *)ui)->ip_ttl = inp->inp_ip_ttl;	/* XXX */
923ca98b82cSDavid Greenman 	((struct ip *)ui)->ip_tos = inp->inp_ip_tos;	/* XXX */
924df8bae1dSRodney W. Grimes 	udpstat.udps_opackets++;
925cfa1ca9dSYoshinobu Inoue 
9265c32ea65SRobert Watson 	if (unlock_udbinfo)
9275c32ea65SRobert Watson 		INP_INFO_WUNLOCK(&udbinfo);
92897d8d152SAndre Oppermann 	error = ip_output(m, inp->inp_options, NULL, ipflags,
9295d846453SSam Leffler 	    inp->inp_moptions, inp);
9305c32ea65SRobert Watson 	INP_UNLOCK(inp);
931df8bae1dSRodney W. Grimes 	return (error);
932df8bae1dSRodney W. Grimes 
933df8bae1dSRodney W. Grimes release:
9345c32ea65SRobert Watson 	INP_UNLOCK(inp);
9355c32ea65SRobert Watson 	if (unlock_udbinfo)
9365c32ea65SRobert Watson 		INP_INFO_WUNLOCK(&udbinfo);
937df8bae1dSRodney W. Grimes 	m_freem(m);
938df8bae1dSRodney W. Grimes 	return (error);
939df8bae1dSRodney W. Grimes }
940df8bae1dSRodney W. Grimes 
94176429de4SYoshinobu Inoue u_long	udp_sendspace = 9216;		/* really max datagram size */
942032dcc76SLuigi Rizzo 					/* 40 1K datagrams */
943e59898ffSMaxime Henrion SYSCTL_ULONG(_net_inet_udp, UDPCTL_MAXDGRAM, maxdgram, CTLFLAG_RW,
9443d177f46SBill Fumerola     &udp_sendspace, 0, "Maximum outgoing UDP datagram size");
9450312fbe9SPoul-Henning Kamp 
946cfa1ca9dSYoshinobu Inoue u_long	udp_recvspace = 40 * (1024 +
947cfa1ca9dSYoshinobu Inoue #ifdef INET6
948cfa1ca9dSYoshinobu Inoue 				      sizeof(struct sockaddr_in6)
949cfa1ca9dSYoshinobu Inoue #else
950cfa1ca9dSYoshinobu Inoue 				      sizeof(struct sockaddr_in)
951cfa1ca9dSYoshinobu Inoue #endif
952cfa1ca9dSYoshinobu Inoue 				      );
953e59898ffSMaxime Henrion SYSCTL_ULONG(_net_inet_udp, UDPCTL_RECVSPACE, recvspace, CTLFLAG_RW,
9540ca2861fSRuslan Ermilov     &udp_recvspace, 0, "Maximum space for incoming UDP datagrams");
955df8bae1dSRodney W. Grimes 
956ac45e92fSRobert Watson static void
957d0390e05SGarrett Wollman udp_abort(struct socket *so)
958df8bae1dSRodney W. Grimes {
959d0390e05SGarrett Wollman 	struct inpcb *inp;
960df8bae1dSRodney W. Grimes 
961d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
96214ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_abort: inp == NULL"));
96314ba8addSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
964f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
965a152f8a3SRobert Watson 	if (inp->inp_faddr.s_addr != INADDR_ANY) {
966a152f8a3SRobert Watson 		in_pcbdisconnect(inp);
967a152f8a3SRobert Watson 		inp->inp_laddr.s_addr = INADDR_ANY;
968d0390e05SGarrett Wollman 		soisdisconnected(so);
969a152f8a3SRobert Watson 	}
970a152f8a3SRobert Watson 	INP_UNLOCK(inp);
971f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
972df8bae1dSRodney W. Grimes }
973df8bae1dSRodney W. Grimes 
974d0390e05SGarrett Wollman static int
975b40ce416SJulian Elischer udp_attach(struct socket *so, int proto, struct thread *td)
976d0390e05SGarrett Wollman {
977d0390e05SGarrett Wollman 	struct inpcb *inp;
978277afaffSRobert Watson 	int error;
979d0390e05SGarrett Wollman 
980d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
98114ba8addSRobert Watson 	KASSERT(inp == NULL, ("udp_attach: inp != NULL"));
982cfa1ca9dSYoshinobu Inoue 	error = soreserve(so, udp_sendspace, udp_recvspace);
983f24618aaSRobert Watson 	if (error)
984cfa1ca9dSYoshinobu Inoue 		return error;
985f24618aaSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
986d915b280SStephan Uphoff 	error = in_pcballoc(so, &udbinfo);
98753b57cd1SSam Leffler 	if (error) {
98853b57cd1SSam Leffler 		INP_INFO_WUNLOCK(&udbinfo);
989d0390e05SGarrett Wollman 		return error;
99053b57cd1SSam Leffler 	}
991cfa1ca9dSYoshinobu Inoue 
992cfa1ca9dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
993f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
994cfa1ca9dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV4;
995cfa1ca9dSYoshinobu Inoue 	inp->inp_ip_ttl = ip_defttl;
996f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
997d0390e05SGarrett Wollman 	return 0;
998df8bae1dSRodney W. Grimes }
999d0390e05SGarrett Wollman 
1000d0390e05SGarrett Wollman static int
1001b40ce416SJulian Elischer udp_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
1002d0390e05SGarrett Wollman {
1003d0390e05SGarrett Wollman 	struct inpcb *inp;
1004277afaffSRobert Watson 	int error;
1005d0390e05SGarrett Wollman 
1006d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
100714ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_bind: inp == NULL"));
100814ba8addSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
1009f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
1010b0330ed9SPawel Jakub Dawidek 	error = in_pcbbind(inp, nam, td->td_ucred);
1011f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
1012f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
1013d0390e05SGarrett Wollman 	return error;
1014d0390e05SGarrett Wollman }
1015d0390e05SGarrett Wollman 
1016a152f8a3SRobert Watson static void
1017a152f8a3SRobert Watson udp_close(struct socket *so)
1018a152f8a3SRobert Watson {
1019a152f8a3SRobert Watson 	struct inpcb *inp;
1020a152f8a3SRobert Watson 
1021a152f8a3SRobert Watson 	inp = sotoinpcb(so);
1022a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("udp_close: inp == NULL"));
1023a152f8a3SRobert Watson 	INP_INFO_WLOCK(&udbinfo);
1024a152f8a3SRobert Watson 	INP_LOCK(inp);
1025a152f8a3SRobert Watson 	if (inp->inp_faddr.s_addr != INADDR_ANY) {
1026a152f8a3SRobert Watson 		in_pcbdisconnect(inp);
1027a152f8a3SRobert Watson 		inp->inp_laddr.s_addr = INADDR_ANY;
1028a152f8a3SRobert Watson 		soisdisconnected(so);
1029a152f8a3SRobert Watson 	}
1030a152f8a3SRobert Watson 	INP_UNLOCK(inp);
1031a152f8a3SRobert Watson 	INP_INFO_WUNLOCK(&udbinfo);
1032a152f8a3SRobert Watson }
1033a152f8a3SRobert Watson 
1034d0390e05SGarrett Wollman static int
1035b40ce416SJulian Elischer udp_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
1036d0390e05SGarrett Wollman {
1037d0390e05SGarrett Wollman 	struct inpcb *inp;
1038277afaffSRobert Watson 	int error;
103975c13541SPoul-Henning Kamp 	struct sockaddr_in *sin;
1040d0390e05SGarrett Wollman 
1041d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
104214ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_connect: inp == NULL"));
104314ba8addSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
1044f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
1045f76fcf6dSJeffrey Hsu 	if (inp->inp_faddr.s_addr != INADDR_ANY) {
1046f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
1047f76fcf6dSJeffrey Hsu 		INP_INFO_WUNLOCK(&udbinfo);
1048d0390e05SGarrett Wollman 		return EISCONN;
1049f76fcf6dSJeffrey Hsu 	}
105075c13541SPoul-Henning Kamp 	sin = (struct sockaddr_in *)nam;
1051812d8653SSam Leffler 	if (jailed(td->td_ucred))
1052a854ed98SJohn Baldwin 		prison_remote_ip(td->td_ucred, 0, &sin->sin_addr.s_addr);
1053b0330ed9SPawel Jakub Dawidek 	error = in_pcbconnect(inp, nam, td->td_ucred);
10544cc20ab1SSeigo Tanimura 	if (error == 0)
1055df8bae1dSRodney W. Grimes 		soisconnected(so);
1056f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
1057f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
1058d0390e05SGarrett Wollman 	return error;
1059df8bae1dSRodney W. Grimes }
1060d0390e05SGarrett Wollman 
1061bc725eafSRobert Watson static void
1062d0390e05SGarrett Wollman udp_detach(struct socket *so)
1063d0390e05SGarrett Wollman {
1064d0390e05SGarrett Wollman 	struct inpcb *inp;
1065d0390e05SGarrett Wollman 
1066d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
106714ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_detach: inp == NULL"));
1068a152f8a3SRobert Watson 	KASSERT(inp->inp_faddr.s_addr == INADDR_ANY,
1069a152f8a3SRobert Watson 	    ("udp_detach: not disconnected"));
107014ba8addSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
1071f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
1072d0390e05SGarrett Wollman 	in_pcbdetach(inp);
107314ba8addSRobert Watson 	in_pcbfree(inp);
1074f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
1075d0390e05SGarrett Wollman }
1076d0390e05SGarrett Wollman 
1077d0390e05SGarrett Wollman static int
1078d0390e05SGarrett Wollman udp_disconnect(struct socket *so)
1079d0390e05SGarrett Wollman {
1080d0390e05SGarrett Wollman 	struct inpcb *inp;
1081d0390e05SGarrett Wollman 
1082d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
108314ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_disconnect: inp == NULL"));
108414ba8addSRobert Watson 	INP_INFO_WLOCK(&udbinfo);
1085f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
1086f76fcf6dSJeffrey Hsu 	if (inp->inp_faddr.s_addr == INADDR_ANY) {
1087f76fcf6dSJeffrey Hsu 		INP_INFO_WUNLOCK(&udbinfo);
1088f76fcf6dSJeffrey Hsu 		INP_UNLOCK(inp);
1089d0390e05SGarrett Wollman 		return ENOTCONN;
1090f76fcf6dSJeffrey Hsu 	}
1091d0390e05SGarrett Wollman 
1092df8bae1dSRodney W. Grimes 	in_pcbdisconnect(inp);
1093df8bae1dSRodney W. Grimes 	inp->inp_laddr.s_addr = INADDR_ANY;
1094d45e4f99SMaxim Konovalov 	SOCK_LOCK(so);
1095d45e4f99SMaxim Konovalov 	so->so_state &= ~SS_ISCONNECTED;		/* XXX */
1096d45e4f99SMaxim Konovalov 	SOCK_UNLOCK(so);
1097f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
1098f76fcf6dSJeffrey Hsu 	INP_INFO_WUNLOCK(&udbinfo);
1099d0390e05SGarrett Wollman 	return 0;
1100df8bae1dSRodney W. Grimes }
1101df8bae1dSRodney W. Grimes 
1102d0390e05SGarrett Wollman static int
110357bf258eSGarrett Wollman udp_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
1104b40ce416SJulian Elischer 	    struct mbuf *control, struct thread *td)
1105d0390e05SGarrett Wollman {
1106d0390e05SGarrett Wollman 	struct inpcb *inp;
1107d0390e05SGarrett Wollman 
1108d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
110914ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_send: inp == NULL"));
11105c32ea65SRobert Watson 	return udp_output(inp, m, addr, control, td);
1111d0390e05SGarrett Wollman }
1112d0390e05SGarrett Wollman 
111376429de4SYoshinobu Inoue int
1114d0390e05SGarrett Wollman udp_shutdown(struct socket *so)
1115d0390e05SGarrett Wollman {
1116d0390e05SGarrett Wollman 	struct inpcb *inp;
1117d0390e05SGarrett Wollman 
1118d0390e05SGarrett Wollman 	inp = sotoinpcb(so);
111914ba8addSRobert Watson 	KASSERT(inp != NULL, ("udp_shutdown: inp == NULL"));
1120f76fcf6dSJeffrey Hsu 	INP_LOCK(inp);
1121d0390e05SGarrett Wollman 	socantsendmore(so);
1122f76fcf6dSJeffrey Hsu 	INP_UNLOCK(inp);
1123d0390e05SGarrett Wollman 	return 0;
1124d0390e05SGarrett Wollman }
1125d0390e05SGarrett Wollman 
1126f76fcf6dSJeffrey Hsu /*
1127f76fcf6dSJeffrey Hsu  * This is the wrapper function for in_setsockaddr.  We just pass down
1128f76fcf6dSJeffrey Hsu  * the pcbinfo for in_setsockaddr to lock.  We don't want to do the locking
1129f76fcf6dSJeffrey Hsu  * here because in_setsockaddr will call malloc and might block.
1130f76fcf6dSJeffrey Hsu  */
1131f76fcf6dSJeffrey Hsu static int
1132f76fcf6dSJeffrey Hsu udp_sockaddr(struct socket *so, struct sockaddr **nam)
1133f76fcf6dSJeffrey Hsu {
1134f76fcf6dSJeffrey Hsu 	return (in_setsockaddr(so, nam, &udbinfo));
1135f76fcf6dSJeffrey Hsu }
1136f76fcf6dSJeffrey Hsu 
1137f76fcf6dSJeffrey Hsu /*
1138f76fcf6dSJeffrey Hsu  * This is the wrapper function for in_setpeeraddr.  We just pass down
1139f76fcf6dSJeffrey Hsu  * the pcbinfo for in_setpeeraddr to lock.
1140f76fcf6dSJeffrey Hsu  */
1141f76fcf6dSJeffrey Hsu static int
1142f76fcf6dSJeffrey Hsu udp_peeraddr(struct socket *so, struct sockaddr **nam)
1143f76fcf6dSJeffrey Hsu {
1144f76fcf6dSJeffrey Hsu 	return (in_setpeeraddr(so, nam, &udbinfo));
1145f76fcf6dSJeffrey Hsu }
1146f76fcf6dSJeffrey Hsu 
1147d0390e05SGarrett Wollman struct pr_usrreqs udp_usrreqs = {
1148756d52a1SPoul-Henning Kamp 	.pru_abort =		udp_abort,
1149756d52a1SPoul-Henning Kamp 	.pru_attach =		udp_attach,
1150756d52a1SPoul-Henning Kamp 	.pru_bind =		udp_bind,
1151756d52a1SPoul-Henning Kamp 	.pru_connect =		udp_connect,
1152756d52a1SPoul-Henning Kamp 	.pru_control =		in_control,
1153756d52a1SPoul-Henning Kamp 	.pru_detach =		udp_detach,
1154756d52a1SPoul-Henning Kamp 	.pru_disconnect =	udp_disconnect,
1155756d52a1SPoul-Henning Kamp 	.pru_peeraddr =		udp_peeraddr,
1156756d52a1SPoul-Henning Kamp 	.pru_send =		udp_send,
115759b8854eSRobert Watson 	.pru_sosend =		sosend_dgram,
1158756d52a1SPoul-Henning Kamp 	.pru_shutdown =		udp_shutdown,
1159756d52a1SPoul-Henning Kamp 	.pru_sockaddr =		udp_sockaddr,
1160a152f8a3SRobert Watson 	.pru_sosetlabel =	in_pcbsosetlabel,
1161a152f8a3SRobert Watson 	.pru_close =		udp_close,
1162d0390e05SGarrett Wollman };
1163