/* * Copyright (c) 2000-2021 Apple Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. The rights granted to you under the License * may not be used to create, or enable the creation or redistribution of, * unlawful or unlicensed copies of an Apple operating system, or to * circumvent, violate, or enable the circumvention or violation of, any * terms of an Apple operating system software license agreement. * * Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ */ /* $FreeBSD: src/sys/netinet6/udp6_output.c,v 1.1.2.3 2001/08/31 13:49:58 jlemon Exp $ */ /* $KAME: udp6_output.c,v 1.31 2001/05/21 16:39:15 jinmei Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* * Copyright (c) 1982, 1986, 1989, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * @(#)udp_var.h 8.1 (Berkeley) 6/10/93 */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #if NECP #include #endif /* NECP */ #include #if CONTENT_FILTER #include #endif /* CONTENT_FILTER */ #include /* * UDP protocol inplementation. * Per RFC 768, August, 1980. */ int udp6_output(struct in6pcb *in6p, struct mbuf *m, struct sockaddr *addr6, struct mbuf *control, struct proc *p) { u_int32_t ulen = m->m_pkthdr.len; u_int32_t plen = sizeof(struct udphdr) + ulen; struct ip6_hdr *ip6; struct udphdr *udp6; struct in6_addr *laddr, *faddr; u_short fport; int error = 0; struct ip6_pktopts opt, *optp = NULL; struct ip6_moptions *im6o; int af = AF_INET6, hlen = sizeof(struct ip6_hdr); int flags; struct sockaddr_in6 tmp; struct in6_addr storage; int sotc = SO_TC_UNSPEC; int netsvctype = _NET_SERVICE_TYPE_UNSPEC; struct ip6_out_args ip6oa; struct flowadv *adv = &ip6oa.ip6oa_flowadv; struct socket *so = in6p->in6p_socket; struct route_in6 ro; int flowadv = 0; bool sndinprog_cnt_used = false; #if CONTENT_FILTER struct m_tag *cfil_tag = NULL; bool cfil_faddr_use = false; uint32_t cfil_so_state_change_cnt = 0; struct sockaddr *cfil_faddr = NULL; struct sockaddr_in6 *cfil_sin6 = NULL; #endif bool check_qos_marking_again = (so->so_flags1 & SOF1_QOSMARKING_POLICY_OVERRIDE) ? FALSE : TRUE; uint32_t lifscope = IFSCOPE_NONE, fifscope = IFSCOPE_NONE; bzero(&ip6oa, sizeof(ip6oa)); ip6oa.ip6oa_boundif = IFSCOPE_NONE; ip6oa.ip6oa_flags = IP6OAF_SELECT_SRCIF; /* Enable flow advisory only when connected */ flowadv = (so->so_state & SS_ISCONNECTED) ? 1 : 0; if (flowadv && INP_WAIT_FOR_IF_FEEDBACK(in6p)) { error = ENOBUFS; goto release; } if (in6p->inp_flags & INP_BOUND_IF) { ip6oa.ip6oa_boundif = in6p->inp_boundifp->if_index; ip6oa.ip6oa_flags |= IP6OAF_BOUND_IF; } else if (!in6_embedded_scope && IN6_IS_SCOPE_EMBED(&in6p->in6p_faddr)) { ip6oa.ip6oa_boundif = in6p->inp_fifscope; ip6oa.ip6oa_flags |= IP6OAF_BOUND_IF; } if (INP_NO_CELLULAR(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_NO_CELLULAR; } if (INP_NO_EXPENSIVE(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_NO_EXPENSIVE; } if (INP_NO_CONSTRAINED(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_NO_CONSTRAINED; } if (INP_AWDL_UNRESTRICTED(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_AWDL_UNRESTRICTED; } if (INP_INTCOPROC_ALLOWED(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_INTCOPROC_ALLOWED; } if (INP_MANAGEMENT_ALLOWED(in6p)) { ip6oa.ip6oa_flags |= IP6OAF_MANAGEMENT_ALLOWED; } #if CONTENT_FILTER /* * If socket is subject to UDP Content Filter and no addr is passed in, * retrieve CFIL saved state from mbuf and use it if necessary. */ if (CFIL_DGRAM_FILTERED(so) && !addr6) { cfil_tag = cfil_dgram_get_socket_state(m, &cfil_so_state_change_cnt, NULL, &cfil_faddr, NULL); if (cfil_tag) { cfil_sin6 = SIN6(cfil_faddr); if ((so->so_state_change_cnt != cfil_so_state_change_cnt) && (in6p->in6p_fport != cfil_sin6->sin6_port || !in6_are_addr_equal_scoped(&in6p->in6p_faddr, &cfil_sin6->sin6_addr, in6p->inp_fifscope, cfil_sin6->sin6_scope_id))) { /* * Socket is connected but socket state and dest addr/port changed. * We need to use the saved faddr info. */ cfil_faddr_use = true; } } } #endif if (control) { sotc = so_tc_from_control(control, &netsvctype); if ((error = ip6_setpktopts(control, &opt, NULL, IPPROTO_UDP)) != 0) { goto release; } optp = &opt; } else { optp = in6p->in6p_outputopts; } if (sotc == SO_TC_UNSPEC) { sotc = so->so_traffic_class; netsvctype = so->so_netsvctype; } ip6oa.ip6oa_sotc = sotc; ip6oa.ip6oa_netsvctype = netsvctype; in6p->inp_sndinprog_cnt++; sndinprog_cnt_used = true; if (addr6) { /* * IPv4 version of udp_output calls in_pcbconnect in this case, * which has its costs. * * Since we saw no essential reason for calling in_pcbconnect, * we get rid of such kind of logic, and call in6_selectsrc * and in6_pcbsetport in order to fill in the local address * and the local port. */ struct sockaddr_in6 *sin6 = SIN6(addr6); if (sin6->sin6_port == 0) { error = EADDRNOTAVAIL; goto release; } if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { /* how about ::ffff:0.0.0.0 case? */ error = EISCONN; goto release; } /* protect *sin6 from overwrites */ tmp = *sin6; sin6 = &tmp; faddr = &sin6->sin6_addr; fport = sin6->sin6_port; /* allow 0 port */ if (IN6_IS_ADDR_V4MAPPED(faddr)) { if ((in6p->in6p_flags & IN6P_IPV6_V6ONLY)) { /* * I believe we should explicitly discard the * packet when mapped addresses are disabled, * rather than send the packet as an IPv6 one. * If we chose the latter approach, the packet * might be sent out on the wire based on the * default route, the situation which we'd * probably want to avoid. * (20010421 jinmei@kame.net) */ error = EINVAL; goto release; } else { af = AF_INET; } } /* KAME hack: embed scopeid */ if (in6_embedscope(&sin6->sin6_addr, sin6, in6p, NULL, optp, IN6_NULL_IF_EMBEDDED_SCOPE(&sin6->sin6_scope_id)) != 0) { error = EINVAL; goto release; } fifscope = sin6->sin6_scope_id; if (!IN6_IS_ADDR_V4MAPPED(faddr)) { struct ifnet *src_ifp = NULL; laddr = in6_selectsrc(sin6, optp, in6p, &in6p->in6p_route, &src_ifp, &storage, ip6oa.ip6oa_boundif, &error); if (src_ifp != NULL) { lifscope = src_ifp->if_index; ifnet_release(src_ifp); } } else { laddr = &in6p->in6p_laddr; /* XXX */ lifscope = in6p->inp_lifscope; } if (laddr == NULL) { if (error == 0) { error = EADDRNOTAVAIL; } goto release; } if (in6p->in6p_lport == 0 && (error = in6_pcbsetport(laddr, in6p, p, 0)) != 0) { goto release; } } else { if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) { error = ENOTCONN; goto release; } laddr = &in6p->in6p_laddr; faddr = &in6p->in6p_faddr; fport = in6p->in6p_fport; fifscope = in6p->inp_fifscope; lifscope = in6p->inp_lifscope; #if CONTENT_FILTER if (cfil_faddr_use) { faddr = &SIN6(cfil_faddr)->sin6_addr; fport = SIN6(cfil_faddr)->sin6_port; fifscope = SIN6(cfil_faddr)->sin6_scope_id; /* Do not use cached route */ ROUTE_RELEASE(&in6p->in6p_route); } #endif if (IN6_IS_ADDR_V4MAPPED(faddr)) { if ((in6p->in6p_flags & IN6P_IPV6_V6ONLY)) { /* * XXX: this case would happen when the * application sets the V6ONLY flag after * connecting the foreign address. * Such applications should be fixed, * so we bark here. */ log(LOG_INFO, "udp6_output: IPV6_V6ONLY " "option was set for a connected socket\n"); error = EINVAL; goto release; } else { af = AF_INET; } } } if (in6p->inp_flowhash == 0) { inp_calc_flowhash(in6p); ASSERT(in6p->inp_flowhash != 0); } /* update flowinfo - RFC 6437 */ if (in6p->inp_flow == 0 && in6p->in6p_flags & IN6P_AUTOFLOWLABEL) { in6p->inp_flow &= ~IPV6_FLOWLABEL_MASK; in6p->inp_flow |= (htonl(ip6_randomflowlabel()) & IPV6_FLOWLABEL_MASK); } if (af == AF_INET) { hlen = sizeof(struct ip); } if (fport == htons(53) && !(so->so_flags1 & SOF1_DNS_COUNTED)) { so->so_flags1 |= SOF1_DNS_COUNTED; INC_ATOMIC_INT64_LIM(net_api_stats.nas_socket_inet_dgram_dns); } /* * Calculate data length and get a mbuf * for UDP and IP6 headers. */ M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT, 1); if (m == 0) { error = ENOBUFS; goto release; } /* * Stuff checksum and output datagram. */ udp6 = (struct udphdr *)(void *)(mtod(m, caddr_t) + hlen); udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */ udp6->uh_dport = fport; if (plen <= 0xffff) { udp6->uh_ulen = htons((u_short)plen); } else { udp6->uh_ulen = 0; } udp6->uh_sum = 0; switch (af) { case AF_INET6: ip6 = mtod(m, struct ip6_hdr *); ip6->ip6_flow = in6p->inp_flow & IPV6_FLOWINFO_MASK; ip6->ip6_vfc &= ~IPV6_VERSION_MASK; ip6->ip6_vfc |= IPV6_VERSION; #if 0 /* ip6_plen will be filled in ip6_output. */ ip6->ip6_plen = htons((u_short)plen); #endif ip6->ip6_nxt = IPPROTO_UDP; ip6->ip6_hlim = in6_selecthlim(in6p, in6p->in6p_route.ro_rt ? in6p->in6p_route.ro_rt->rt_ifp : NULL); ip6->ip6_src = *laddr; ip6->ip6_dst = *faddr; udp6->uh_sum = in6_pseudo(laddr, faddr, htonl(plen + IPPROTO_UDP)); m->m_pkthdr.csum_flags = (CSUM_UDPIPV6 | CSUM_ZERO_INVERT); m->m_pkthdr.csum_data = offsetof(struct udphdr, uh_sum); if (!IN6_IS_ADDR_UNSPECIFIED(laddr)) { ip6oa.ip6oa_flags |= IP6OAF_BOUND_SRCADDR; } flags = IPV6_OUTARGS; udp6stat.udp6s_opackets++; #if NECP { necp_kernel_policy_id policy_id; necp_kernel_policy_id skip_policy_id; u_int32_t route_rule_id; u_int32_t pass_flags; /* * We need a route to perform NECP route rule checks */ if (net_qos_policy_restricted != 0 && ROUTE_UNUSABLE(&in6p->inp_route)) { struct sockaddr_in6 to; struct sockaddr_in6 from; ROUTE_RELEASE(&in6p->inp_route); SOCKADDR_ZERO(&from, sizeof(struct sockaddr_in6)); from.sin6_family = AF_INET6; from.sin6_len = sizeof(struct sockaddr_in6); from.sin6_addr = *laddr; SOCKADDR_ZERO(&to, sizeof(struct sockaddr_in6)); to.sin6_family = AF_INET6; to.sin6_len = sizeof(struct sockaddr_in6); to.sin6_addr = *faddr; in6p->inp_route.ro_dst.sa_family = AF_INET6; in6p->inp_route.ro_dst.sa_len = sizeof(struct sockaddr_in6); SIN6(&in6p->inp_route.ro_dst)->sin6_addr = *faddr; if (!in6_embedded_scope) { SIN6(&in6p->inp_route.ro_dst)->sin6_scope_id = IN6_IS_SCOPE_EMBED(faddr) ? fifscope : IFSCOPE_NONE; } rtalloc_scoped(&in6p->inp_route, ip6oa.ip6oa_boundif); inp_update_necp_policy(in6p, SA(&from), SA(&to), ip6oa.ip6oa_boundif); in6p->inp_policyresult.results.qos_marking_gencount = 0; } if (!necp_socket_is_allowed_to_send_recv_v6(in6p, in6p->in6p_lport, fport, laddr, faddr, NULL, 0, &policy_id, &route_rule_id, &skip_policy_id, &pass_flags)) { error = EHOSTUNREACH; goto release; } necp_mark_packet_from_socket(m, in6p, policy_id, route_rule_id, skip_policy_id, pass_flags); if (net_qos_policy_restricted != 0) { necp_socket_update_qos_marking(in6p, in6p->in6p_route.ro_rt, route_rule_id); } } #endif /* NECP */ if ((so->so_flags1 & SOF1_QOSMARKING_ALLOWED)) { ip6oa.ip6oa_flags |= IP6OAF_QOSMARKING_ALLOWED; } if (check_qos_marking_again) { ip6oa.ip6oa_flags |= IP6OAF_REDO_QOSMARKING_POLICY; } ip6oa.qos_marking_gencount = in6p->inp_policyresult.results.qos_marking_gencount; #if IPSEC if (in6p->in6p_sp != NULL && ipsec_setsocket(m, so) != 0) { error = ENOBUFS; goto release; } #endif /*IPSEC*/ /* In case of IPv4-mapped address used in previous send */ if (ROUTE_UNUSABLE(&in6p->in6p_route) || rt_key(in6p->in6p_route.ro_rt)->sa_family != AF_INET6) { ROUTE_RELEASE(&in6p->in6p_route); } /* Copy the cached route and take an extra reference */ in6p_route_copyout(in6p, &ro); set_packet_service_class(m, so, sotc, PKT_SCF_IPV6); m->m_pkthdr.pkt_flowsrc = FLOWSRC_INPCB; m->m_pkthdr.pkt_flowid = in6p->inp_flowhash; m->m_pkthdr.pkt_proto = IPPROTO_UDP; m->m_pkthdr.pkt_flags |= (PKTF_FLOW_ID | PKTF_FLOW_LOCALSRC); if (flowadv) { m->m_pkthdr.pkt_flags |= PKTF_FLOW_ADV; } m->m_pkthdr.tx_udp_pid = so->last_pid; if (so->so_flags & SOF_DELEGATED) { m->m_pkthdr.tx_udp_e_pid = so->e_pid; } else { m->m_pkthdr.tx_udp_e_pid = 0; } #if (DEBUG || DEVELOPMENT) if (so->so_flags & SOF_MARK_WAKE_PKT) { so->so_flags &= ~SOF_MARK_WAKE_PKT; m->m_pkthdr.pkt_flags |= PKTF_WAKE_PKT; } #endif /* (DEBUG || DEVELOPMENT) */ im6o = in6p->in6p_moptions; if (im6o != NULL) { IM6O_LOCK(im6o); IM6O_ADDREF_LOCKED(im6o); if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) && im6o->im6o_multicast_ifp != NULL) { in6p->in6p_last_outifp = im6o->im6o_multicast_ifp; #if SKYWALK if (NETNS_TOKEN_VALID(&in6p->inp_netns_token)) { netns_set_ifnet(&in6p->inp_netns_token, in6p->in6p_last_outifp); } #endif /* SKYWALK */ } IM6O_UNLOCK(im6o); } ip6_output_setdstifscope(m, fifscope, NULL); ip6_output_setsrcifscope(m, lifscope, NULL); socket_unlock(so, 0); error = ip6_output(m, optp, &ro, flags, im6o, NULL, &ip6oa); m = NULL; socket_lock(so, 0); if (im6o != NULL) { IM6O_REMREF(im6o); } if (check_qos_marking_again) { in6p->inp_policyresult.results.qos_marking_gencount = ip6oa.qos_marking_gencount; if (ip6oa.ip6oa_flags & IP6OAF_QOSMARKING_ALLOWED) { in6p->inp_socket->so_flags1 |= SOF1_QOSMARKING_ALLOWED; } else { in6p->inp_socket->so_flags1 &= ~SOF1_QOSMARKING_ALLOWED; } } if (error == 0 && nstat_collect) { boolean_t cell, wifi, wired; if (in6p->in6p_route.ro_rt != NULL) { cell = IFNET_IS_CELLULAR(in6p->in6p_route. ro_rt->rt_ifp); wifi = (!cell && IFNET_IS_WIFI(in6p->in6p_route. ro_rt->rt_ifp)); wired = (!wifi && IFNET_IS_WIRED(in6p->in6p_route. ro_rt->rt_ifp)); } else { cell = wifi = wired = FALSE; } INP_ADD_STAT(in6p, cell, wifi, wired, txpackets, 1); INP_ADD_STAT(in6p, cell, wifi, wired, txbytes, ulen); inp_set_activity_bitmap(in6p); } if (flowadv && (adv->code == FADV_FLOW_CONTROLLED || adv->code == FADV_SUSPENDED)) { /* * Return an error to indicate * that the packet has been dropped. */ error = ENOBUFS; inp_set_fc_state(in6p, adv->code); } if (ro.ro_rt != NULL) { struct ifnet *outif = ro.ro_rt->rt_ifp; so->so_pktheadroom = (uint16_t)P2ROUNDUP( sizeof(struct udphdr) + hlen + ifnet_hdrlen(outif) + ifnet_mbuf_packetpreamblelen(outif), sizeof(u_int32_t)); } /* Synchronize PCB cached route */ in6p_route_copyin(in6p, &ro); if (in6p->in6p_route.ro_rt != NULL) { struct rtentry *rt = in6p->in6p_route.ro_rt; struct ifnet *outif; if (IS_LOCALNET_ROUTE(rt)) { in6p->in6p_flags2 |= INP2_LAST_ROUTE_LOCAL; } else { in6p->in6p_flags2 &= ~INP2_LAST_ROUTE_LOCAL; } if (rt->rt_flags & RTF_MULTICAST) { rt = NULL; /* unusable */ } #if CONTENT_FILTER /* * Discard temporary route for cfil case */ if (cfil_faddr_use) { rt = NULL; /* unusable */ } #endif /* * Always discard the cached route for unconnected * socket or if it is a multicast route. */ if (rt == NULL) { ROUTE_RELEASE(&in6p->in6p_route); } /* * If the destination route is unicast, update outif * with that of the route interface used by IP. */ if (rt != NULL) { /* * When an NECP IP tunnel policy forces the outbound interface, * ip6_output_list() informs the transport layer what is the actual * outgoing interface */ if (ip6oa.ip6oa_flags & IP6OAF_BOUND_IF) { outif = ifindex2ifnet[ip6oa.ip6oa_boundif]; } else { outif = rt->rt_ifp; } if (outif != NULL && outif != in6p->in6p_last_outifp) { in6p->in6p_last_outifp = outif; #if SKYWALK if (NETNS_TOKEN_VALID(&in6p->inp_netns_token)) { netns_set_ifnet(&in6p->inp_netns_token, in6p->in6p_last_outifp); } #endif /* SKYWALK */ so->so_pktheadroom = (uint16_t)P2ROUNDUP( sizeof(struct udphdr) + hlen + ifnet_hdrlen(outif) + ifnet_mbuf_packetpreamblelen(outif), sizeof(u_int32_t)); } } } else { ROUTE_RELEASE(&in6p->in6p_route); } /* * If output interface was cellular/expensive, and this * socket is denied access to it, generate an event. */ if (error != 0 && (ip6oa.ip6oa_flags & IP6OAF_R_IFDENIED) && (INP_NO_CELLULAR(in6p) || INP_NO_EXPENSIVE(in6p) || INP_NO_CONSTRAINED(in6p))) { soevent(in6p->inp_socket, (SO_FILT_HINT_LOCKED | SO_FILT_HINT_IFDENIED)); } break; case AF_INET: error = EAFNOSUPPORT; goto release; } goto releaseopt; release: if (m != NULL) { m_freem(m); } releaseopt: if (control != NULL) { if (optp == &opt) { ip6_clearpktopts(optp, -1); } m_freem(control); } #if CONTENT_FILTER if (cfil_tag) { m_tag_free(cfil_tag); } #endif if (sndinprog_cnt_used) { VERIFY(in6p->inp_sndinprog_cnt > 0); if (--in6p->inp_sndinprog_cnt == 0) { in6p->inp_flags &= ~(INP_FC_FEEDBACK); if (in6p->inp_sndingprog_waiters > 0) { wakeup(&in6p->inp_sndinprog_cnt); } } sndinprog_cnt_used = false; } return error; }