10ce1624dSStephen J. Kiernan /*- 20ce1624dSStephen J. Kiernan * Copyright (c) 1999 Poul-Henning Kamp. 30ce1624dSStephen J. Kiernan * Copyright (c) 2008 Bjoern A. Zeeb. 40ce1624dSStephen J. Kiernan * Copyright (c) 2009 James Gritton. 50ce1624dSStephen J. Kiernan * All rights reserved. 60ce1624dSStephen J. Kiernan * 70ce1624dSStephen J. Kiernan * Redistribution and use in source and binary forms, with or without 80ce1624dSStephen J. Kiernan * modification, are permitted provided that the following conditions 90ce1624dSStephen J. Kiernan * are met: 100ce1624dSStephen J. Kiernan * 1. Redistributions of source code must retain the above copyright 110ce1624dSStephen J. Kiernan * notice, this list of conditions and the following disclaimer. 120ce1624dSStephen J. Kiernan * 2. Redistributions in binary form must reproduce the above copyright 130ce1624dSStephen J. Kiernan * notice, this list of conditions and the following disclaimer in the 140ce1624dSStephen J. Kiernan * documentation and/or other materials provided with the distribution. 150ce1624dSStephen J. Kiernan * 160ce1624dSStephen J. Kiernan * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 170ce1624dSStephen J. Kiernan * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 180ce1624dSStephen J. Kiernan * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 190ce1624dSStephen J. Kiernan * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 200ce1624dSStephen J. Kiernan * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 210ce1624dSStephen J. Kiernan * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 220ce1624dSStephen J. Kiernan * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 230ce1624dSStephen J. Kiernan * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 240ce1624dSStephen J. Kiernan * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 250ce1624dSStephen J. Kiernan * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 260ce1624dSStephen J. Kiernan * SUCH DAMAGE. 270ce1624dSStephen J. Kiernan */ 280ce1624dSStephen J. Kiernan 290ce1624dSStephen J. Kiernan #include <sys/cdefs.h> 300ce1624dSStephen J. Kiernan __FBSDID("$FreeBSD$"); 310ce1624dSStephen J. Kiernan 320ce1624dSStephen J. Kiernan #include "opt_ddb.h" 330ce1624dSStephen J. Kiernan #include "opt_inet.h" 340ce1624dSStephen J. Kiernan #include "opt_inet6.h" 350ce1624dSStephen J. Kiernan 360ce1624dSStephen J. Kiernan #include <sys/param.h> 370ce1624dSStephen J. Kiernan #include <sys/types.h> 380ce1624dSStephen J. Kiernan #include <sys/kernel.h> 390ce1624dSStephen J. Kiernan #include <sys/systm.h> 400ce1624dSStephen J. Kiernan #include <sys/errno.h> 410ce1624dSStephen J. Kiernan #include <sys/sysproto.h> 420ce1624dSStephen J. Kiernan #include <sys/malloc.h> 430ce1624dSStephen J. Kiernan #include <sys/osd.h> 440ce1624dSStephen J. Kiernan #include <sys/priv.h> 450ce1624dSStephen J. Kiernan #include <sys/proc.h> 460ce1624dSStephen J. Kiernan #include <sys/taskqueue.h> 470ce1624dSStephen J. Kiernan #include <sys/fcntl.h> 480ce1624dSStephen J. Kiernan #include <sys/jail.h> 490ce1624dSStephen J. Kiernan #include <sys/lock.h> 500ce1624dSStephen J. Kiernan #include <sys/mutex.h> 510ce1624dSStephen J. Kiernan #include <sys/racct.h> 520ce1624dSStephen J. Kiernan #include <sys/refcount.h> 530ce1624dSStephen J. Kiernan #include <sys/sx.h> 540ce1624dSStephen J. Kiernan #include <sys/sysent.h> 550ce1624dSStephen J. Kiernan #include <sys/namei.h> 560ce1624dSStephen J. Kiernan #include <sys/mount.h> 570ce1624dSStephen J. Kiernan #include <sys/queue.h> 580ce1624dSStephen J. Kiernan #include <sys/socket.h> 590ce1624dSStephen J. Kiernan #include <sys/syscallsubr.h> 600ce1624dSStephen J. Kiernan #include <sys/sysctl.h> 610ce1624dSStephen J. Kiernan #include <sys/vnode.h> 620ce1624dSStephen J. Kiernan 630ce1624dSStephen J. Kiernan #include <net/if.h> 640ce1624dSStephen J. Kiernan #include <net/vnet.h> 650ce1624dSStephen J. Kiernan 660ce1624dSStephen J. Kiernan #include <netinet/in.h> 670ce1624dSStephen J. Kiernan 68*eb8dcdeaSGleb Smirnoff static void 69*eb8dcdeaSGleb Smirnoff prison_bcopy_primary_ip6(const struct prison *pr, struct in6_addr *ia6) 70*eb8dcdeaSGleb Smirnoff { 71*eb8dcdeaSGleb Smirnoff 72*eb8dcdeaSGleb Smirnoff bcopy(prison_ip_get0(pr, PR_INET6), ia6, sizeof(struct in6_addr)); 73*eb8dcdeaSGleb Smirnoff } 74*eb8dcdeaSGleb Smirnoff 750ce1624dSStephen J. Kiernan int 760ce1624dSStephen J. Kiernan prison_qcmp_v6(const void *ip1, const void *ip2) 770ce1624dSStephen J. Kiernan { 780ce1624dSStephen J. Kiernan const struct in6_addr *ia6a, *ia6b; 790ce1624dSStephen J. Kiernan int i, rc; 800ce1624dSStephen J. Kiernan 810ce1624dSStephen J. Kiernan ia6a = (const struct in6_addr *)ip1; 820ce1624dSStephen J. Kiernan ia6b = (const struct in6_addr *)ip2; 830ce1624dSStephen J. Kiernan 840ce1624dSStephen J. Kiernan rc = 0; 850ce1624dSStephen J. Kiernan for (i = 0; rc == 0 && i < sizeof(struct in6_addr); i++) { 860ce1624dSStephen J. Kiernan if (ia6a->s6_addr[i] > ia6b->s6_addr[i]) 870ce1624dSStephen J. Kiernan rc = 1; 880ce1624dSStephen J. Kiernan else if (ia6a->s6_addr[i] < ia6b->s6_addr[i]) 890ce1624dSStephen J. Kiernan rc = -1; 900ce1624dSStephen J. Kiernan } 910ce1624dSStephen J. Kiernan return (rc); 920ce1624dSStephen J. Kiernan } 930ce1624dSStephen J. Kiernan 94*eb8dcdeaSGleb Smirnoff bool 95*eb8dcdeaSGleb Smirnoff prison_valid_v6(const void *ip) 960ce1624dSStephen J. Kiernan { 97*eb8dcdeaSGleb Smirnoff const struct in6_addr *ia = ip; 980ce1624dSStephen J. Kiernan 99*eb8dcdeaSGleb Smirnoff return (!IN6_IS_ADDR_UNSPECIFIED(ia)); 1000ce1624dSStephen J. Kiernan } 1010ce1624dSStephen J. Kiernan 1020ce1624dSStephen J. Kiernan /* 1030ce1624dSStephen J. Kiernan * Pass back primary IPv6 address for this jail. 1040ce1624dSStephen J. Kiernan * 1050ce1624dSStephen J. Kiernan * If not restricted return success but do not alter the address. Caller has 1060ce1624dSStephen J. Kiernan * to make sure to initialize it correctly (e.g. IN6ADDR_ANY_INIT). 1070ce1624dSStephen J. Kiernan * 1080ce1624dSStephen J. Kiernan * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv6. 1090ce1624dSStephen J. Kiernan */ 1100ce1624dSStephen J. Kiernan int 1110ce1624dSStephen J. Kiernan prison_get_ip6(struct ucred *cred, struct in6_addr *ia6) 1120ce1624dSStephen J. Kiernan { 1130ce1624dSStephen J. Kiernan struct prison *pr; 1140ce1624dSStephen J. Kiernan 1150ce1624dSStephen J. Kiernan KASSERT(cred != NULL, ("%s: cred is NULL", __func__)); 1160ce1624dSStephen J. Kiernan KASSERT(ia6 != NULL, ("%s: ia6 is NULL", __func__)); 1170ce1624dSStephen J. Kiernan 1180ce1624dSStephen J. Kiernan pr = cred->cr_prison; 1190ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) 1200ce1624dSStephen J. Kiernan return (0); 1210ce1624dSStephen J. Kiernan mtx_lock(&pr->pr_mtx); 1220ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) { 1230ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 1240ce1624dSStephen J. Kiernan return (0); 1250ce1624dSStephen J. Kiernan } 126*eb8dcdeaSGleb Smirnoff if (pr->pr_addrs[PR_INET6] == NULL) { 1270ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 1280ce1624dSStephen J. Kiernan return (EAFNOSUPPORT); 1290ce1624dSStephen J. Kiernan } 1300ce1624dSStephen J. Kiernan 131*eb8dcdeaSGleb Smirnoff prison_bcopy_primary_ip6(pr, ia6); 1320ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 1330ce1624dSStephen J. Kiernan return (0); 1340ce1624dSStephen J. Kiernan } 1350ce1624dSStephen J. Kiernan 1360ce1624dSStephen J. Kiernan /* 1370ce1624dSStephen J. Kiernan * Return 1 if we should do proper source address selection or are not jailed. 1380ce1624dSStephen J. Kiernan * We will return 0 if we should bypass source address selection in favour 1390ce1624dSStephen J. Kiernan * of the primary jail IPv6 address. Only in this case *ia will be updated and 1400ce1624dSStephen J. Kiernan * returned in NBO. 1410ce1624dSStephen J. Kiernan * Return EAFNOSUPPORT, in case this jail does not allow IPv6. 1420ce1624dSStephen J. Kiernan */ 1430ce1624dSStephen J. Kiernan int 1440ce1624dSStephen J. Kiernan prison_saddrsel_ip6(struct ucred *cred, struct in6_addr *ia6) 1450ce1624dSStephen J. Kiernan { 1460ce1624dSStephen J. Kiernan struct prison *pr; 1470ce1624dSStephen J. Kiernan struct in6_addr lia6; 1480ce1624dSStephen J. Kiernan int error; 1490ce1624dSStephen J. Kiernan 1500ce1624dSStephen J. Kiernan KASSERT(cred != NULL, ("%s: cred is NULL", __func__)); 1510ce1624dSStephen J. Kiernan KASSERT(ia6 != NULL, ("%s: ia6 is NULL", __func__)); 1520ce1624dSStephen J. Kiernan 1530ce1624dSStephen J. Kiernan if (!jailed(cred)) 1540ce1624dSStephen J. Kiernan return (1); 1550ce1624dSStephen J. Kiernan 1560ce1624dSStephen J. Kiernan pr = cred->cr_prison; 1570ce1624dSStephen J. Kiernan if (pr->pr_flags & PR_IP6_SADDRSEL) 1580ce1624dSStephen J. Kiernan return (1); 1590ce1624dSStephen J. Kiernan 1600ce1624dSStephen J. Kiernan lia6 = in6addr_any; 1610ce1624dSStephen J. Kiernan error = prison_get_ip6(cred, &lia6); 1620ce1624dSStephen J. Kiernan if (error) 1630ce1624dSStephen J. Kiernan return (error); 1640ce1624dSStephen J. Kiernan if (IN6_IS_ADDR_UNSPECIFIED(&lia6)) 1650ce1624dSStephen J. Kiernan return (1); 1660ce1624dSStephen J. Kiernan 1670ce1624dSStephen J. Kiernan bcopy(&lia6, ia6, sizeof(struct in6_addr)); 1680ce1624dSStephen J. Kiernan return (0); 1690ce1624dSStephen J. Kiernan } 1700ce1624dSStephen J. Kiernan 1710ce1624dSStephen J. Kiernan /* 1720ce1624dSStephen J. Kiernan * Return true if pr1 and pr2 have the same IPv6 address restrictions. 1730ce1624dSStephen J. Kiernan */ 1740ce1624dSStephen J. Kiernan int 1750ce1624dSStephen J. Kiernan prison_equal_ip6(struct prison *pr1, struct prison *pr2) 1760ce1624dSStephen J. Kiernan { 1770ce1624dSStephen J. Kiernan 1780ce1624dSStephen J. Kiernan if (pr1 == pr2) 1790ce1624dSStephen J. Kiernan return (1); 1800ce1624dSStephen J. Kiernan 1810ce1624dSStephen J. Kiernan while (pr1 != &prison0 && 1820ce1624dSStephen J. Kiernan #ifdef VIMAGE 1830ce1624dSStephen J. Kiernan !(pr1->pr_flags & PR_VNET) && 1840ce1624dSStephen J. Kiernan #endif 1850ce1624dSStephen J. Kiernan !(pr1->pr_flags & PR_IP6_USER)) 1860ce1624dSStephen J. Kiernan pr1 = pr1->pr_parent; 1870ce1624dSStephen J. Kiernan while (pr2 != &prison0 && 1880ce1624dSStephen J. Kiernan #ifdef VIMAGE 1890ce1624dSStephen J. Kiernan !(pr2->pr_flags & PR_VNET) && 1900ce1624dSStephen J. Kiernan #endif 1910ce1624dSStephen J. Kiernan !(pr2->pr_flags & PR_IP6_USER)) 1920ce1624dSStephen J. Kiernan pr2 = pr2->pr_parent; 1930ce1624dSStephen J. Kiernan return (pr1 == pr2); 1940ce1624dSStephen J. Kiernan } 1950ce1624dSStephen J. Kiernan 1960ce1624dSStephen J. Kiernan /* 1970ce1624dSStephen J. Kiernan * Make sure our (source) address is set to something meaningful to this jail. 1980ce1624dSStephen J. Kiernan * 1990ce1624dSStephen J. Kiernan * v6only should be set based on (inp->inp_flags & IN6P_IPV6_V6ONLY != 0) 2000ce1624dSStephen J. Kiernan * when needed while binding. 2010ce1624dSStephen J. Kiernan * 2020ce1624dSStephen J. Kiernan * Returns 0 if jail doesn't restrict IPv6 or if address belongs to jail, 2030ce1624dSStephen J. Kiernan * EADDRNOTAVAIL if the address doesn't belong, or EAFNOSUPPORT if the jail 2040ce1624dSStephen J. Kiernan * doesn't allow IPv6. 2050ce1624dSStephen J. Kiernan */ 2060ce1624dSStephen J. Kiernan int 2070ce1624dSStephen J. Kiernan prison_local_ip6(struct ucred *cred, struct in6_addr *ia6, int v6only) 2080ce1624dSStephen J. Kiernan { 2090ce1624dSStephen J. Kiernan struct prison *pr; 2100ce1624dSStephen J. Kiernan int error; 2110ce1624dSStephen J. Kiernan 2120ce1624dSStephen J. Kiernan KASSERT(cred != NULL, ("%s: cred is NULL", __func__)); 2130ce1624dSStephen J. Kiernan KASSERT(ia6 != NULL, ("%s: ia6 is NULL", __func__)); 2140ce1624dSStephen J. Kiernan 2150ce1624dSStephen J. Kiernan pr = cred->cr_prison; 2160ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) 2170ce1624dSStephen J. Kiernan return (0); 2180ce1624dSStephen J. Kiernan mtx_lock(&pr->pr_mtx); 2190ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) { 2200ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2210ce1624dSStephen J. Kiernan return (0); 2220ce1624dSStephen J. Kiernan } 223*eb8dcdeaSGleb Smirnoff if (pr->pr_addrs[PR_INET6] == NULL) { 2240ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2250ce1624dSStephen J. Kiernan return (EAFNOSUPPORT); 2260ce1624dSStephen J. Kiernan } 2270ce1624dSStephen J. Kiernan 2280ce1624dSStephen J. Kiernan if (IN6_IS_ADDR_UNSPECIFIED(ia6)) { 2290ce1624dSStephen J. Kiernan /* 2300ce1624dSStephen J. Kiernan * In case there is only 1 IPv6 address, and v6only is true, 2310ce1624dSStephen J. Kiernan * then bind directly. 2320ce1624dSStephen J. Kiernan */ 233*eb8dcdeaSGleb Smirnoff if (v6only != 0 && prison_ip_cnt(pr, PR_INET6) == 1) 234*eb8dcdeaSGleb Smirnoff prison_bcopy_primary_ip6(pr, ia6); 2350ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2360ce1624dSStephen J. Kiernan return (0); 2370ce1624dSStephen J. Kiernan } 2380ce1624dSStephen J. Kiernan 2390ce1624dSStephen J. Kiernan error = prison_check_ip6_locked(pr, ia6); 2404d806fc6SSteven Hartland if (error == EADDRNOTAVAIL && IN6_IS_ADDR_LOOPBACK(ia6)) { 241*eb8dcdeaSGleb Smirnoff prison_bcopy_primary_ip6(pr, ia6); 2424d806fc6SSteven Hartland error = 0; 2434d806fc6SSteven Hartland } 2444d806fc6SSteven Hartland 2450ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2460ce1624dSStephen J. Kiernan return (error); 2470ce1624dSStephen J. Kiernan } 2480ce1624dSStephen J. Kiernan 2490ce1624dSStephen J. Kiernan /* 2500ce1624dSStephen J. Kiernan * Rewrite destination address in case we will connect to loopback address. 2510ce1624dSStephen J. Kiernan * 2520ce1624dSStephen J. Kiernan * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv6. 2530ce1624dSStephen J. Kiernan */ 2540ce1624dSStephen J. Kiernan int 2550ce1624dSStephen J. Kiernan prison_remote_ip6(struct ucred *cred, struct in6_addr *ia6) 2560ce1624dSStephen J. Kiernan { 2570ce1624dSStephen J. Kiernan struct prison *pr; 2580ce1624dSStephen J. Kiernan 2590ce1624dSStephen J. Kiernan KASSERT(cred != NULL, ("%s: cred is NULL", __func__)); 2600ce1624dSStephen J. Kiernan KASSERT(ia6 != NULL, ("%s: ia6 is NULL", __func__)); 2610ce1624dSStephen J. Kiernan 2620ce1624dSStephen J. Kiernan pr = cred->cr_prison; 2630ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) 2640ce1624dSStephen J. Kiernan return (0); 2650ce1624dSStephen J. Kiernan mtx_lock(&pr->pr_mtx); 2660ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) { 2670ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2680ce1624dSStephen J. Kiernan return (0); 2690ce1624dSStephen J. Kiernan } 270*eb8dcdeaSGleb Smirnoff if (pr->pr_addrs[PR_INET6] == NULL) { 2710ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2720ce1624dSStephen J. Kiernan return (EAFNOSUPPORT); 2730ce1624dSStephen J. Kiernan } 2740ce1624dSStephen J. Kiernan 2754d806fc6SSteven Hartland if (IN6_IS_ADDR_LOOPBACK(ia6) && 2764d806fc6SSteven Hartland prison_check_ip6_locked(pr, ia6) == EADDRNOTAVAIL) { 277*eb8dcdeaSGleb Smirnoff prison_bcopy_primary_ip6(pr, ia6); 2780ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2790ce1624dSStephen J. Kiernan return (0); 2800ce1624dSStephen J. Kiernan } 2810ce1624dSStephen J. Kiernan 2820ce1624dSStephen J. Kiernan /* 2830ce1624dSStephen J. Kiernan * Return success because nothing had to be changed. 2840ce1624dSStephen J. Kiernan */ 2850ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 2860ce1624dSStephen J. Kiernan return (0); 2870ce1624dSStephen J. Kiernan } 2880ce1624dSStephen J. Kiernan 2890ce1624dSStephen J. Kiernan /* 2900ce1624dSStephen J. Kiernan * Check if given address belongs to the jail referenced by cred/prison. 2910ce1624dSStephen J. Kiernan * 2924d806fc6SSteven Hartland * Returns 0 if address belongs to jail, 2934d806fc6SSteven Hartland * EADDRNOTAVAIL if the address doesn't belong to the jail. 2940ce1624dSStephen J. Kiernan */ 2950ce1624dSStephen J. Kiernan int 2960ce1624dSStephen J. Kiernan prison_check_ip6_locked(const struct prison *pr, const struct in6_addr *ia6) 2970ce1624dSStephen J. Kiernan { 2980ce1624dSStephen J. Kiernan 299*eb8dcdeaSGleb Smirnoff if (!(pr->pr_flags & PR_IP6)) 3000ce1624dSStephen J. Kiernan return (0); 3010ce1624dSStephen J. Kiernan 302*eb8dcdeaSGleb Smirnoff return (prison_ip_check(pr, PR_INET6, ia6)); 3030ce1624dSStephen J. Kiernan } 3040ce1624dSStephen J. Kiernan 3050ce1624dSStephen J. Kiernan int 3060ce1624dSStephen J. Kiernan prison_check_ip6(const struct ucred *cred, const struct in6_addr *ia6) 3070ce1624dSStephen J. Kiernan { 3080ce1624dSStephen J. Kiernan struct prison *pr; 3090ce1624dSStephen J. Kiernan int error; 3100ce1624dSStephen J. Kiernan 3110ce1624dSStephen J. Kiernan KASSERT(cred != NULL, ("%s: cred is NULL", __func__)); 3120ce1624dSStephen J. Kiernan KASSERT(ia6 != NULL, ("%s: ia6 is NULL", __func__)); 3130ce1624dSStephen J. Kiernan 3140ce1624dSStephen J. Kiernan pr = cred->cr_prison; 3150ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) 3160ce1624dSStephen J. Kiernan return (0); 3170ce1624dSStephen J. Kiernan mtx_lock(&pr->pr_mtx); 3180ce1624dSStephen J. Kiernan if (!(pr->pr_flags & PR_IP6)) { 3190ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 3200ce1624dSStephen J. Kiernan return (0); 3210ce1624dSStephen J. Kiernan } 322*eb8dcdeaSGleb Smirnoff if (pr->pr_addrs[PR_INET6] == NULL) { 3230ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 3240ce1624dSStephen J. Kiernan return (EAFNOSUPPORT); 3250ce1624dSStephen J. Kiernan } 3260ce1624dSStephen J. Kiernan 3270ce1624dSStephen J. Kiernan error = prison_check_ip6_locked(pr, ia6); 3280ce1624dSStephen J. Kiernan mtx_unlock(&pr->pr_mtx); 3290ce1624dSStephen J. Kiernan return (error); 3300ce1624dSStephen J. Kiernan } 331