/*
- * Copyright (c) 2009 Apple Inc. All rights reserved.
+ * Copyright (c) 2000-2018 Apple Inc. All rights reserved.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
- *
+ *
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* unlawful or unlicensed copies of an Apple operating system, or to
* circumvent, violate, or enable the circumvention or violation of, any
* terms of an Apple operating system software license agreement.
- *
+ *
* Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this file.
- *
+ *
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
- *
+ *
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <sys/proc.h>
#include <sys/syslog.h>
+#include <machine/endian.h>
+
#include <net/if.h>
#include <net/route.h>
#include <net/if_types.h>
+#include <net/ntstat.h>
#include <netinet/in.h>
#include <netinet/in_var.h>
#include <netinet/in_systm.h>
+#include <netinet/in_tclass.h>
#include <netinet/ip.h>
#include <netinet/ip_var.h>
#include <netinet/in_pcb.h>
#include <netinet/icmp6.h>
#include <netinet6/ip6protosw.h>
-#ifdef IPSEC
-#include <netinet6/ipsec.h>
-#ifdef INET6
-#include <netinet6/ipsec6.h>
-#endif
-extern int ipsec_bypass;
-#endif /*IPSEC*/
-
-#include "faith.h"
+#if NECP
+#include <net/necp.h>
+#endif /* NECP */
#include <net/net_osdep.h>
+#if CONTENT_FILTER
+#include <net/content_filter.h>
+#endif /* CONTENT_FILTER */
+
/*
* UDP protocol inplementation.
* Per RFC 768, August, 1980.
*/
-
-#define in6pcb inpcb
-#define udp6stat udpstat
-#define udp6s_opackets udps_opackets
-
-static __inline__ u_int16_t
-get_socket_id(struct socket * s)
-{
- u_int16_t val;
-
- if (s == NULL) {
- return (0);
- }
- val = (u_int16_t)(((uintptr_t)s) / sizeof(struct socket));
- if (val == 0) {
- val = 0xffff;
- }
- return (val);
-}
+extern int soreserveheadroom;
int
-udp6_output(in6p, m, addr6, control, p)
- struct in6pcb *in6p;
- struct mbuf *m;
- struct mbuf *control;
- struct sockaddr *addr6;
- struct proc *p;
+udp6_output(struct in6pcb *in6p, struct mbuf *m, struct sockaddr *addr6,
+ struct mbuf *control, struct proc *p)
{
u_int32_t ulen = m->m_pkthdr.len;
u_int32_t plen = sizeof(struct udphdr) + ulen;
struct in6_addr *laddr, *faddr;
u_short fport;
int error = 0;
- struct ip6_pktopts opt, *stickyopt = in6p->in6p_outputopts;
- int priv;
+ struct ip6_pktopts opt, *optp = NULL;
+ struct ip6_moptions *im6o;
int af = AF_INET6, hlen = sizeof(struct ip6_hdr);
int flags;
struct sockaddr_in6 tmp;
- struct in6_addr storage;
+ struct in6_addr storage;
+ int sotc = SO_TC_UNSPEC;
+ int netsvctype = _NET_SERVICE_TYPE_UNSPEC;
+ struct ip6_out_args ip6oa;
+ struct flowadv *adv = &ip6oa.ip6oa_flowadv;
+ struct socket *so = in6p->in6p_socket;
+ struct route_in6 ro;
+ int flowadv = 0;
+#if CONTENT_FILTER
+ struct m_tag *cfil_tag = NULL;
+ bool cfil_faddr_use = false;
+ uint32_t cfil_so_state_change_cnt = 0;
+ struct sockaddr *cfil_faddr = NULL;
+ struct sockaddr_in6 *cfil_sin6 = NULL;
+#endif
- priv = (proc_suser(p) == 0);
+ bzero(&ip6oa, sizeof(ip6oa));
+ ip6oa.ip6oa_boundif = IFSCOPE_NONE;
+ ip6oa.ip6oa_flags = IP6OAF_SELECT_SRCIF;
+
+ /* Enable flow advisory only when connected */
+ flowadv = (so->so_state & SS_ISCONNECTED) ? 1 : 0;
+
+ if (flowadv && INP_WAIT_FOR_IF_FEEDBACK(in6p)) {
+ error = ENOBUFS;
+ goto release;
+ }
+
+ if (in6p->inp_flags & INP_BOUND_IF) {
+ ip6oa.ip6oa_boundif = in6p->inp_boundifp->if_index;
+ ip6oa.ip6oa_flags |= IP6OAF_BOUND_IF;
+ }
+ if (INP_NO_CELLULAR(in6p)) {
+ ip6oa.ip6oa_flags |= IP6OAF_NO_CELLULAR;
+ }
+ if (INP_NO_EXPENSIVE(in6p)) {
+ ip6oa.ip6oa_flags |= IP6OAF_NO_EXPENSIVE;
+ }
+ if (INP_AWDL_UNRESTRICTED(in6p)) {
+ ip6oa.ip6oa_flags |= IP6OAF_AWDL_UNRESTRICTED;
+ }
+ if (INP_INTCOPROC_ALLOWED(in6p)) {
+ ip6oa.ip6oa_flags |= IP6OAF_INTCOPROC_ALLOWED;
+ }
+
+#if CONTENT_FILTER
+ /*
+ * If socket is subject to UDP Content Filter and no addr is passed in,
+ * retrieve CFIL saved state from mbuf and use it if necessary.
+ */
+ if (so->so_cfil_db && !addr6) {
+ cfil_tag = cfil_udp_get_socket_state(m, &cfil_so_state_change_cnt, NULL, &cfil_faddr);
+ if (cfil_tag) {
+ cfil_sin6 = (struct sockaddr_in6 *)(void *)cfil_faddr;
+ if ((so->so_state_change_cnt != cfil_so_state_change_cnt) &&
+ (in6p->in6p_fport != cfil_sin6->sin6_port ||
+ !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &cfil_sin6->sin6_addr))) {
+ /*
+ * Socket is connected but socket state and dest addr/port changed.
+ * We need to use the saved faddr info.
+ */
+ cfil_faddr_use = true;
+ }
+ }
+ }
+#endif
if (control) {
- if ((error = ip6_setpktoptions(control, &opt, priv, 0)) != 0)
+ sotc = so_tc_from_control(control, &netsvctype);
+ if ((error = ip6_setpktopts(control, &opt,
+ NULL, IPPROTO_UDP)) != 0) {
goto release;
- in6p->in6p_outputopts = &opt;
+ }
+ optp = &opt;
+ } else {
+ optp = in6p->in6p_outputopts;
}
+ if (sotc == SO_TC_UNSPEC) {
+ sotc = so->so_traffic_class;
+ netsvctype = so->so_netsvctype;
+ }
+ ip6oa.ip6oa_sotc = sotc;
+ ip6oa.ip6oa_netsvctype = netsvctype;
+
if (addr6) {
/*
* IPv4 version of udp_output calls in_pcbconnect in this case,
- * which needs splnet and affects performance.
+ * which has its costs.
+ *
* Since we saw no essential reason for calling in_pcbconnect,
* we get rid of such kind of logic, and call in6_selectsrc
* and in6_pcbsetport in order to fill in the local address
* and the local port.
*/
- struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)addr6;
+ struct sockaddr_in6 *sin6 =
+ (struct sockaddr_in6 *)(void *)addr6;
+
if (sin6->sin6_port == 0) {
error = EADDRNOTAVAIL;
goto release;
*/
error = EINVAL;
goto release;
- } else
+ } else {
af = AF_INET;
+ }
}
/* KAME hack: embed scopeid */
- if (in6_embedscope(&sin6->sin6_addr, sin6, in6p, NULL) != 0) {
+ if (in6_embedscope(&sin6->sin6_addr, sin6, in6p, NULL,
+ optp) != 0) {
error = EINVAL;
goto release;
}
if (!IN6_IS_ADDR_V4MAPPED(faddr)) {
- laddr = in6_selectsrc(sin6, in6p->in6p_outputopts,
- in6p->in6p_moptions,
- &in6p->in6p_route,
- &in6p->in6p_laddr, &storage, &error);
- } else
- laddr = &in6p->in6p_laddr; /* XXX */
+ laddr = in6_selectsrc(sin6, optp,
+ in6p, &in6p->in6p_route, NULL, &storage,
+ ip6oa.ip6oa_boundif, &error);
+ } else {
+ laddr = &in6p->in6p_laddr; /* XXX */
+ }
if (laddr == NULL) {
- if (error == 0)
+ if (error == 0) {
error = EADDRNOTAVAIL;
+ }
goto release;
}
if (in6p->in6p_lport == 0 &&
- (error = in6_pcbsetport(laddr, in6p, p, 0)) != 0)
+ (error = in6_pcbsetport(laddr, in6p, p, 0)) != 0) {
goto release;
+ }
} else {
if (IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr)) {
error = ENOTCONN;
goto release;
}
- if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_faddr)) {
+ laddr = &in6p->in6p_laddr;
+ faddr = &in6p->in6p_faddr;
+ fport = in6p->in6p_fport;
+#if CONTENT_FILTER
+ if (cfil_faddr_use) {
+ faddr = &((struct sockaddr_in6 *)(void *)cfil_faddr)->sin6_addr;
+ fport = ((struct sockaddr_in6 *)(void *)cfil_faddr)->sin6_port;
+
+ /* Do not use cached route */
+ ROUTE_RELEASE(&in6p->in6p_route);
+ }
+#endif
+ if (IN6_IS_ADDR_V4MAPPED(faddr)) {
if ((in6p->in6p_flags & IN6P_IPV6_V6ONLY)) {
/*
* XXX: this case would happen when the
"option was set for a connected socket\n");
error = EINVAL;
goto release;
- } else
+ } else {
af = AF_INET;
+ }
}
- laddr = &in6p->in6p_laddr;
- faddr = &in6p->in6p_faddr;
- fport = in6p->in6p_fport;
}
- if (af == AF_INET)
+ if (in6p->inp_flowhash == 0) {
+ in6p->inp_flowhash = inp_calc_flowhash(in6p);
+ }
+ /* update flowinfo - RFC 6437 */
+ if (in6p->inp_flow == 0 && in6p->in6p_flags & IN6P_AUTOFLOWLABEL) {
+ in6p->inp_flow &= ~IPV6_FLOWLABEL_MASK;
+ in6p->inp_flow |=
+ (htonl(in6p->inp_flowhash) & IPV6_FLOWLABEL_MASK);
+ }
+
+ if (af == AF_INET) {
hlen = sizeof(struct ip);
+ }
+
+ if (fport == htons(53) && !(so->so_flags1 & SOF1_DNS_COUNTED)) {
+ so->so_flags1 |= SOF1_DNS_COUNTED;
+ INC_ATOMIC_INT64_LIM(net_api_stats.nas_socket_inet_dgram_dns);
+ }
/*
* Calculate data length and get a mbuf
* for UDP and IP6 headers.
*/
- M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT);
+ M_PREPEND(m, hlen + sizeof(struct udphdr), M_DONTWAIT, 1);
if (m == 0) {
error = ENOBUFS;
goto release;
/*
* Stuff checksum and output datagram.
*/
- udp6 = (struct udphdr *)(mtod(m, caddr_t) + hlen);
+ udp6 = (struct udphdr *)(void *)(mtod(m, caddr_t) + hlen);
udp6->uh_sport = in6p->in6p_lport; /* lport is always set in the PCB */
udp6->uh_dport = fport;
- if (plen <= 0xffff)
+ if (plen <= 0xffff) {
udp6->uh_ulen = htons((u_short)plen);
- else
+ } else {
udp6->uh_ulen = 0;
+ }
udp6->uh_sum = 0;
switch (af) {
case AF_INET6:
ip6 = mtod(m, struct ip6_hdr *);
- ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK;
- ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
- ip6->ip6_vfc |= IPV6_VERSION;
-#if 0 /* ip6_plen will be filled in ip6_output. */
- ip6->ip6_plen = htons((u_short)plen);
+ ip6->ip6_flow = in6p->inp_flow & IPV6_FLOWINFO_MASK;
+ ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
+ ip6->ip6_vfc |= IPV6_VERSION;
+#if 0 /* ip6_plen will be filled in ip6_output. */
+ ip6->ip6_plen = htons((u_short)plen);
#endif
- ip6->ip6_nxt = IPPROTO_UDP;
- ip6->ip6_hlim = in6_selecthlim(in6p,
- in6p->in6p_route.ro_rt ?
- in6p->in6p_route.ro_rt->rt_ifp : NULL);
- ip6->ip6_src = *laddr;
- ip6->ip6_dst = *faddr;
-
- if ((udp6->uh_sum = in6_cksum(m, IPPROTO_UDP,
- sizeof(struct ip6_hdr), plen)) == 0) {
- udp6->uh_sum = 0xffff;
+ ip6->ip6_nxt = IPPROTO_UDP;
+ ip6->ip6_hlim = in6_selecthlim(in6p, in6p->in6p_route.ro_rt ?
+ in6p->in6p_route.ro_rt->rt_ifp : NULL);
+ ip6->ip6_src = *laddr;
+ ip6->ip6_dst = *faddr;
+
+ udp6->uh_sum = in6_pseudo(laddr, faddr,
+ htonl(plen + IPPROTO_UDP));
+ m->m_pkthdr.csum_flags = (CSUM_UDPIPV6 | CSUM_ZERO_INVERT);
+ m->m_pkthdr.csum_data = offsetof(struct udphdr, uh_sum);
+
+ if (!IN6_IS_ADDR_UNSPECIFIED(laddr)) {
+ ip6oa.ip6oa_flags |= IP6OAF_BOUND_SRCADDR;
}
- flags = 0;
+ flags = IPV6_OUTARGS;
udp6stat.udp6s_opackets++;
-#ifdef IPSEC
- if (ipsec_bypass == 0 && ipsec_setsocket(m, in6p->in6p_socket) != 0) {
+
+#if NECP
+ {
+ necp_kernel_policy_id policy_id;
+ necp_kernel_policy_id skip_policy_id;
+ u_int32_t route_rule_id;
+
+ /*
+ * We need a route to perform NECP route rule checks
+ */
+ if (net_qos_policy_restricted != 0 &&
+ ROUTE_UNUSABLE(&in6p->inp_route)) {
+ struct sockaddr_in6 to;
+ struct sockaddr_in6 from;
+
+ ROUTE_RELEASE(&in6p->inp_route);
+
+ bzero(&from, sizeof(struct sockaddr_in6));
+ from.sin6_family = AF_INET6;
+ from.sin6_len = sizeof(struct sockaddr_in6);
+ from.sin6_addr = *laddr;
+
+ bzero(&to, sizeof(struct sockaddr_in6));
+ to.sin6_family = AF_INET6;
+ to.sin6_len = sizeof(struct sockaddr_in6);
+ to.sin6_addr = *faddr;
+
+ in6p->inp_route.ro_dst.sa_family = AF_INET6;
+ in6p->inp_route.ro_dst.sa_len = sizeof(struct sockaddr_in6);
+ ((struct sockaddr_in6 *)(void *)&in6p->inp_route.ro_dst)->sin6_addr =
+ *faddr;
+
+ rtalloc_scoped(&in6p->inp_route, ip6oa.ip6oa_boundif);
+
+ inp_update_necp_policy(in6p, (struct sockaddr *)&from,
+ (struct sockaddr *)&to, ip6oa.ip6oa_boundif);
+ in6p->inp_policyresult.results.qos_marking_gencount = 0;
+ }
+
+ if (!necp_socket_is_allowed_to_send_recv_v6(in6p, in6p->in6p_lport, fport, laddr, faddr, NULL, &policy_id, &route_rule_id, &skip_policy_id)) {
+ error = EHOSTUNREACH;
+ goto release;
+ }
+
+ necp_mark_packet_from_socket(m, in6p, policy_id, route_rule_id, skip_policy_id);
+
+ if (net_qos_policy_restricted != 0) {
+ necp_socket_update_qos_marking(in6p, in6p->in6p_route.ro_rt,
+ NULL, route_rule_id);
+ }
+ }
+#endif /* NECP */
+ if ((so->so_flags1 & SOF1_QOSMARKING_ALLOWED)) {
+ ip6oa.ip6oa_flags |= IP6OAF_QOSMARKING_ALLOWED;
+ }
+
+#if IPSEC
+ if (in6p->in6p_sp != NULL && ipsec_setsocket(m, so) != 0) {
error = ENOBUFS;
goto release;
}
#endif /*IPSEC*/
- m->m_pkthdr.socket_id = get_socket_id(in6p->in6p_socket);
-#if PKT_PRIORITY
- if (soisbackground(in6p->in6p_socket))
- m_prio_background(m);
-#endif /* PKT_PRIORITY */
- error = ip6_output(m, in6p->in6p_outputopts, &in6p->in6p_route,
- flags, in6p->in6p_moptions, NULL, 0);
-
-#if IFNET_ROUTE_REFCNT
+
+ /* In case of IPv4-mapped address used in previous send */
+ if (ROUTE_UNUSABLE(&in6p->in6p_route) ||
+ rt_key(in6p->in6p_route.ro_rt)->sa_family != AF_INET6) {
+ ROUTE_RELEASE(&in6p->in6p_route);
+ }
+
+ /* Copy the cached route and take an extra reference */
+ in6p_route_copyout(in6p, &ro);
+
+ set_packet_service_class(m, so, sotc, PKT_SCF_IPV6);
+
+ m->m_pkthdr.pkt_flowsrc = FLOWSRC_INPCB;
+ m->m_pkthdr.pkt_flowid = in6p->inp_flowhash;
+ m->m_pkthdr.pkt_proto = IPPROTO_UDP;
+ m->m_pkthdr.pkt_flags |= (PKTF_FLOW_ID | PKTF_FLOW_LOCALSRC);
+ if (flowadv) {
+ m->m_pkthdr.pkt_flags |= PKTF_FLOW_ADV;
+ }
+ m->m_pkthdr.tx_udp_pid = so->last_pid;
+ if (so->so_flags & SOF_DELEGATED) {
+ m->m_pkthdr.tx_udp_e_pid = so->e_pid;
+ } else {
+ m->m_pkthdr.tx_udp_e_pid = 0;
+ }
+
+ im6o = in6p->in6p_moptions;
+ if (im6o != NULL) {
+ IM6O_LOCK(im6o);
+ IM6O_ADDREF_LOCKED(im6o);
+ if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
+ im6o->im6o_multicast_ifp != NULL) {
+ in6p->in6p_last_outifp =
+ im6o->im6o_multicast_ifp;
+ }
+ IM6O_UNLOCK(im6o);
+ }
+
+ in6p->inp_sndinprog_cnt++;
+
+ socket_unlock(so, 0);
+ error = ip6_output(m, optp, &ro, flags, im6o, NULL, &ip6oa);
+ m = NULL;
+ socket_lock(so, 0);
+
+ if (im6o != NULL) {
+ IM6O_REMREF(im6o);
+ }
+
+ if (error == 0 && nstat_collect) {
+ boolean_t cell, wifi, wired;
+
+ if (in6p->in6p_route.ro_rt != NULL) {
+ cell = IFNET_IS_CELLULAR(in6p->in6p_route.
+ ro_rt->rt_ifp);
+ wifi = (!cell && IFNET_IS_WIFI(in6p->in6p_route.
+ ro_rt->rt_ifp));
+ wired = (!wifi && IFNET_IS_WIRED(in6p->in6p_route.
+ ro_rt->rt_ifp));
+ } else {
+ cell = wifi = wired = FALSE;
+ }
+ INP_ADD_STAT(in6p, cell, wifi, wired, txpackets, 1);
+ INP_ADD_STAT(in6p, cell, wifi, wired, txbytes, ulen);
+ inp_set_activity_bitmap(in6p);
+ }
+
+ if (flowadv && (adv->code == FADV_FLOW_CONTROLLED ||
+ adv->code == FADV_SUSPENDED)) {
+ /*
+ * Return an error to indicate
+ * that the packet has been dropped.
+ */
+ error = ENOBUFS;
+ inp_set_fc_state(in6p, adv->code);
+ }
+
+ VERIFY(in6p->inp_sndinprog_cnt > 0);
+ if (--in6p->inp_sndinprog_cnt == 0) {
+ in6p->inp_flags &= ~(INP_FC_FEEDBACK);
+ }
+
+ if (ro.ro_rt != NULL) {
+ struct ifnet *outif = ro.ro_rt->rt_ifp;
+
+ so->so_pktheadroom = P2ROUNDUP(
+ sizeof(struct udphdr) +
+ hlen +
+ ifnet_hdrlen(outif) +
+ ifnet_mbuf_packetpreamblelen(outif),
+ sizeof(u_int32_t));
+ }
+
+ /* Synchronize PCB cached route */
+ in6p_route_copyin(in6p, &ro);
+
+ if (in6p->in6p_route.ro_rt != NULL) {
+ struct rtentry *rt = in6p->in6p_route.ro_rt;
+ struct ifnet *outif;
+
+ if (rt->rt_flags & RTF_MULTICAST) {
+ rt = NULL; /* unusable */
+ }
+#if CONTENT_FILTER
+ /*
+ * Discard temporary route for cfil case
+ */
+ if (cfil_faddr_use) {
+ rt = NULL; /* unusable */
+ }
+#endif
+
+ /*
+ * Always discard the cached route for unconnected
+ * socket or if it is a multicast route.
+ */
+ if (rt == NULL) {
+ ROUTE_RELEASE(&in6p->in6p_route);
+ }
+
+ /*
+ * If the destination route is unicast, update outif
+ * with that of the route interface used by IP.
+ */
+ if (rt != NULL &&
+ (outif = rt->rt_ifp) != in6p->in6p_last_outifp) {
+ in6p->in6p_last_outifp = outif;
+
+ so->so_pktheadroom = P2ROUNDUP(
+ sizeof(struct udphdr) +
+ hlen +
+ ifnet_hdrlen(outif) +
+ ifnet_mbuf_packetpreamblelen(outif),
+ sizeof(u_int32_t));
+ }
+ } else {
+ ROUTE_RELEASE(&in6p->in6p_route);
+ }
+
/*
- * Always discard the cached route for unconnected socket
- * or if it is a multicast route.
+ * If output interface was cellular/expensive, and this
+ * socket is denied access to it, generate an event.
*/
- if (in6p->in6p_route.ro_rt != NULL &&
- ((in6p->in6p_route.ro_rt->rt_flags & RTF_MULTICAST) ||
- in6p->in6p_socket == NULL ||
- in6p->in6p_socket->so_state != SS_ISCONNECTED)) {
- rtfree(in6p->in6p_route.ro_rt);
- in6p->in6p_route.ro_rt = NULL;
+ if (error != 0 && (ip6oa.ip6oa_retflags & IP6OARF_IFDENIED) &&
+ (INP_NO_CELLULAR(in6p) || INP_NO_EXPENSIVE(in6p))) {
+ soevent(in6p->inp_socket, (SO_FILT_HINT_LOCKED |
+ SO_FILT_HINT_IFDENIED));
}
-#endif /* IFNET_ROUTE_REFCNT */
break;
case AF_INET:
error = EAFNOSUPPORT;
goto releaseopt;
release:
- m_freem(m);
+ if (m != NULL) {
+ m_freem(m);
+ }
releaseopt:
- if (control) {
- ip6_clearpktopts(in6p->in6p_outputopts, 0, -1);
- in6p->in6p_outputopts = stickyopt;
+ if (control != NULL) {
+ if (optp == &opt) {
+ ip6_clearpktopts(optp, -1);
+ }
m_freem(control);
}
- return(error);
+#if CONTENT_FILTER
+ if (cfil_tag) {
+ m_tag_free(cfil_tag);
+ }
+#endif
+ return error;
}