xref: /freebsd/sys/netinet6/in6_pcb.c (revision 55fd3bafdb91047ccb5b7b7db19ec12651bced6b)
1caf43b02SWarner Losh /*-
282cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
382cd038dSYoshinobu Inoue  * All rights reserved.
482cd038dSYoshinobu Inoue  *
582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
782cd038dSYoshinobu Inoue  * are met:
882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1382cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1582cd038dSYoshinobu Inoue  *    without specific prior written permission.
1682cd038dSYoshinobu Inoue  *
1782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
1882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
2882cd038dSYoshinobu Inoue  *
29b48287a3SDavid E. O'Brien  *	$KAME: in6_pcb.c,v 1.31 2001/05/21 05:45:10 jinmei Exp $
3082cd038dSYoshinobu Inoue  */
3182cd038dSYoshinobu Inoue 
32caf43b02SWarner Losh /*-
3382cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1991, 1993
3482cd038dSYoshinobu Inoue  *	The Regents of the University of California.  All rights reserved.
3582cd038dSYoshinobu Inoue  *
3682cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3782cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3882cd038dSYoshinobu Inoue  * are met:
3982cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
4082cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4182cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4282cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4382cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
4482cd038dSYoshinobu Inoue  * 4. Neither the name of the University nor the names of its contributors
4582cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
4682cd038dSYoshinobu Inoue  *    without specific prior written permission.
4782cd038dSYoshinobu Inoue  *
4882cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
4982cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
5082cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5182cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5282cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5382cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5482cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5582cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
5682cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5782cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5882cd038dSYoshinobu Inoue  * SUCH DAMAGE.
5982cd038dSYoshinobu Inoue  *
6082cd038dSYoshinobu Inoue  *	@(#)in_pcb.c	8.2 (Berkeley) 1/4/94
6182cd038dSYoshinobu Inoue  */
6282cd038dSYoshinobu Inoue 
63b48287a3SDavid E. O'Brien #include <sys/cdefs.h>
64b48287a3SDavid E. O'Brien __FBSDID("$FreeBSD$");
65b48287a3SDavid E. O'Brien 
6633841545SHajimu UMEMOTO #include "opt_inet.h"
6733841545SHajimu UMEMOTO #include "opt_inet6.h"
686a800098SYoshinobu Inoue #include "opt_ipsec.h"
698b953b3fSRobert Watson #include "opt_mac.h"
7082cd038dSYoshinobu Inoue 
7182cd038dSYoshinobu Inoue #include <sys/param.h>
7282cd038dSYoshinobu Inoue #include <sys/systm.h>
7382cd038dSYoshinobu Inoue #include <sys/malloc.h>
7482cd038dSYoshinobu Inoue #include <sys/mbuf.h>
75fb59c426SYoshinobu Inoue #include <sys/domain.h>
7682cd038dSYoshinobu Inoue #include <sys/protosw.h>
7782cd038dSYoshinobu Inoue #include <sys/socket.h>
7882cd038dSYoshinobu Inoue #include <sys/socketvar.h>
7982cd038dSYoshinobu Inoue #include <sys/sockio.h>
8082cd038dSYoshinobu Inoue #include <sys/errno.h>
8182cd038dSYoshinobu Inoue #include <sys/time.h>
82acd3428bSRobert Watson #include <sys/priv.h>
8382cd038dSYoshinobu Inoue #include <sys/proc.h>
8482cd038dSYoshinobu Inoue #include <sys/jail.h>
85603724d3SBjoern A. Zeeb #include <sys/vimage.h>
8682cd038dSYoshinobu Inoue 
8794540027SJeff Roberson #include <vm/uma.h>
8882cd038dSYoshinobu Inoue 
8982cd038dSYoshinobu Inoue #include <net/if.h>
9082cd038dSYoshinobu Inoue #include <net/if_types.h>
9182cd038dSYoshinobu Inoue #include <net/route.h>
9282cd038dSYoshinobu Inoue 
9382cd038dSYoshinobu Inoue #include <netinet/in.h>
9482cd038dSYoshinobu Inoue #include <netinet/in_var.h>
9582cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
96f76fcf6dSJeffrey Hsu #include <netinet/tcp_var.h>
97686cdd19SJun-ichiro itojun Hagino #include <netinet/ip6.h>
98fb59c426SYoshinobu Inoue #include <netinet/ip_var.h>
99ac957cd2SJulian Elischer 
10082cd038dSYoshinobu Inoue #include <netinet6/ip6_var.h>
10182cd038dSYoshinobu Inoue #include <netinet6/nd6.h>
10282cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
10382cd038dSYoshinobu Inoue #include <netinet6/in6_pcb.h>
104a1f7e5f8SHajimu UMEMOTO #include <netinet6/scope6_var.h>
10582cd038dSYoshinobu Inoue 
106b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
107b9234fafSSam Leffler #include <netipsec/ipsec.h>
108b9234fafSSam Leffler #include <netipsec/ipsec6.h>
109b9234fafSSam Leffler #include <netipsec/key.h>
110b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
111b9234fafSSam Leffler 
1128b953b3fSRobert Watson #include <security/mac/mac_framework.h>
1138b953b3fSRobert Watson 
11482cd038dSYoshinobu Inoue struct	in6_addr zeroin6_addr;
11582cd038dSYoshinobu Inoue 
11682cd038dSYoshinobu Inoue int
1171272577eSXin LI in6_pcbbind(register struct inpcb *inp, struct sockaddr *nam,
1181272577eSXin LI     struct ucred *cred)
11982cd038dSYoshinobu Inoue {
1208b615593SMarko Zec 	INIT_VNET_INET6(inp->inp_vnet);
1218b615593SMarko Zec 	INIT_VNET_INET(inp->inp_vnet);
12282cd038dSYoshinobu Inoue 	struct socket *so = inp->inp_socket;
12382cd038dSYoshinobu Inoue 	struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)NULL;
12482cd038dSYoshinobu Inoue 	struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
12582cd038dSYoshinobu Inoue 	u_short	lport = 0;
1264cc20ab1SSeigo Tanimura 	int wild = 0, reuseport = (so->so_options & SO_REUSEPORT);
12782cd038dSYoshinobu Inoue 
12807385abdSRobert Watson 	INP_INFO_WLOCK_ASSERT(pcbinfo);
1298501a69cSRobert Watson 	INP_WLOCK_ASSERT(inp);
13007385abdSRobert Watson 
131603724d3SBjoern A. Zeeb 	if (!V_in6_ifaddr) /* XXX broken! */
13282cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
13382cd038dSYoshinobu Inoue 	if (inp->inp_lport || !IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
13482cd038dSYoshinobu Inoue 		return (EINVAL);
13582cd038dSYoshinobu Inoue 	if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0)
136421d8aa6SBjoern A. Zeeb 		wild = INPLOOKUP_WILDCARD;
13782cd038dSYoshinobu Inoue 	if (nam) {
138a1f7e5f8SHajimu UMEMOTO 		int error;
139a1f7e5f8SHajimu UMEMOTO 
14082cd038dSYoshinobu Inoue 		sin6 = (struct sockaddr_in6 *)nam;
14182cd038dSYoshinobu Inoue 		if (nam->sa_len != sizeof(*sin6))
14282cd038dSYoshinobu Inoue 			return (EINVAL);
14382cd038dSYoshinobu Inoue 		/*
14482cd038dSYoshinobu Inoue 		 * family check.
14582cd038dSYoshinobu Inoue 		 */
14682cd038dSYoshinobu Inoue 		if (nam->sa_family != AF_INET6)
14782cd038dSYoshinobu Inoue 			return (EAFNOSUPPORT);
14882cd038dSYoshinobu Inoue 
149603724d3SBjoern A. Zeeb 		if ((error = sa6_embedscope(sin6, V_ip6_use_defzone)) != 0)
150a1f7e5f8SHajimu UMEMOTO 			return(error);
15182cd038dSYoshinobu Inoue 
15282cd038dSYoshinobu Inoue 		lport = sin6->sin6_port;
15382cd038dSYoshinobu Inoue 		if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
15482cd038dSYoshinobu Inoue 			/*
15582cd038dSYoshinobu Inoue 			 * Treat SO_REUSEADDR as SO_REUSEPORT for multicast;
15682cd038dSYoshinobu Inoue 			 * allow compepte duplication of binding if
15782cd038dSYoshinobu Inoue 			 * SO_REUSEPORT is set, or if SO_REUSEADDR is set
15882cd038dSYoshinobu Inoue 			 * and a multicast address is bound on both
15982cd038dSYoshinobu Inoue 			 * new and duplicated sockets.
16082cd038dSYoshinobu Inoue 			 */
16182cd038dSYoshinobu Inoue 			if (so->so_options & SO_REUSEADDR)
16282cd038dSYoshinobu Inoue 				reuseport = SO_REUSEADDR|SO_REUSEPORT;
16382cd038dSYoshinobu Inoue 		} else if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
16482cd038dSYoshinobu Inoue 			struct ifaddr *ia = NULL;
16582cd038dSYoshinobu Inoue 
16682cd038dSYoshinobu Inoue 			sin6->sin6_port = 0;		/* yech... */
16782cd038dSYoshinobu Inoue 			if ((ia = ifa_ifwithaddr((struct sockaddr *)sin6)) == 0)
16882cd038dSYoshinobu Inoue 				return (EADDRNOTAVAIL);
16982cd038dSYoshinobu Inoue 
17082cd038dSYoshinobu Inoue 			/*
17182cd038dSYoshinobu Inoue 			 * XXX: bind to an anycast address might accidentally
17282cd038dSYoshinobu Inoue 			 * cause sending a packet with anycast source address.
17333841545SHajimu UMEMOTO 			 * We should allow to bind to a deprecated address, since
1747efe5d92SHajimu UMEMOTO 			 * the application dares to use it.
17582cd038dSYoshinobu Inoue 			 */
17682cd038dSYoshinobu Inoue 			if (ia &&
17782cd038dSYoshinobu Inoue 			    ((struct in6_ifaddr *)ia)->ia6_flags &
17833841545SHajimu UMEMOTO 			    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|IN6_IFF_DETACHED)) {
17982cd038dSYoshinobu Inoue 				return (EADDRNOTAVAIL);
18082cd038dSYoshinobu Inoue 			}
18182cd038dSYoshinobu Inoue 		}
18282cd038dSYoshinobu Inoue 		if (lport) {
18382cd038dSYoshinobu Inoue 			struct inpcb *t;
18482cd038dSYoshinobu Inoue 
18582cd038dSYoshinobu Inoue 			/* GROSS */
186603724d3SBjoern A. Zeeb 			if (ntohs(lport) <= V_ipport_reservedhigh &&
187603724d3SBjoern A. Zeeb 			    ntohs(lport) >= V_ipport_reservedlow &&
188acd3428bSRobert Watson 			    priv_check_cred(cred, PRIV_NETINET_RESERVEDPORT,
18932f9753cSRobert Watson 			    0))
19082cd038dSYoshinobu Inoue 				return (EACCES);
191835d4b89SPawel Jakub Dawidek 			if (!IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr) &&
19286d02c5cSBjoern A. Zeeb 			    priv_check_cred(inp->inp_cred,
19332f9753cSRobert Watson 			    PRIV_NETINET_REUSEPORT, 0) != 0) {
194fb59c426SYoshinobu Inoue 				t = in6_pcblookup_local(pcbinfo,
19582cd038dSYoshinobu Inoue 				    &sin6->sin6_addr, lport,
196078b7042SBjoern A. Zeeb 				    INPLOOKUP_WILDCARD, cred);
197f66145c6SYaroslav Tykhiy 				if (t &&
198f66145c6SYaroslav Tykhiy 				    ((t->inp_vflag & INP_TIMEWAIT) == 0) &&
199f66145c6SYaroslav Tykhiy 				    (so->so_type != SOCK_STREAM ||
200f66145c6SYaroslav Tykhiy 				     IN6_IS_ADDR_UNSPECIFIED(&t->in6p_faddr)) &&
2014cc20ab1SSeigo Tanimura 				    (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) ||
20282cd038dSYoshinobu Inoue 				     !IN6_IS_ADDR_UNSPECIFIED(&t->in6p_laddr) ||
20356e6821eSOlivier Houchard 				     (t->inp_socket->so_options & SO_REUSEPORT)
20486d02c5cSBjoern A. Zeeb 				      == 0) && (inp->inp_cred->cr_uid !=
20586d02c5cSBjoern A. Zeeb 				     t->inp_cred->cr_uid))
20682cd038dSYoshinobu Inoue 					return (EADDRINUSE);
20733841545SHajimu UMEMOTO 				if ((inp->inp_flags & IN6P_IPV6_V6ONLY) == 0 &&
208fb59c426SYoshinobu Inoue 				    IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
209fb59c426SYoshinobu Inoue 					struct sockaddr_in sin;
210fb59c426SYoshinobu Inoue 
211fb59c426SYoshinobu Inoue 					in6_sin6_2_sin(&sin, sin6);
212fb59c426SYoshinobu Inoue 					t = in_pcblookup_local(pcbinfo,
213fb59c426SYoshinobu Inoue 					    sin.sin_addr, lport,
214078b7042SBjoern A. Zeeb 					    INPLOOKUP_WILDCARD, cred);
215f66145c6SYaroslav Tykhiy 					if (t &&
216f66145c6SYaroslav Tykhiy 					    ((t->inp_vflag &
217f66145c6SYaroslav Tykhiy 					      INP_TIMEWAIT) == 0) &&
218f66145c6SYaroslav Tykhiy 					    (so->so_type != SOCK_STREAM ||
219f66145c6SYaroslav Tykhiy 					     ntohl(t->inp_faddr.s_addr) ==
220f66145c6SYaroslav Tykhiy 					      INADDR_ANY) &&
22186d02c5cSBjoern A. Zeeb 					    (inp->inp_cred->cr_uid !=
22286d02c5cSBjoern A. Zeeb 					     t->inp_cred->cr_uid))
223fb59c426SYoshinobu Inoue 						return (EADDRINUSE);
224fb59c426SYoshinobu Inoue 				}
22582cd038dSYoshinobu Inoue 			}
22682cd038dSYoshinobu Inoue 			t = in6_pcblookup_local(pcbinfo, &sin6->sin6_addr,
227078b7042SBjoern A. Zeeb 			    lport, wild, cred);
22856e6821eSOlivier Houchard 			if (t && (reuseport & ((t->inp_vflag & INP_TIMEWAIT) ?
22956e6821eSOlivier Houchard 			    intotw(t)->tw_so_options :
23056e6821eSOlivier Houchard 			    t->inp_socket->so_options)) == 0)
23182cd038dSYoshinobu Inoue 				return (EADDRINUSE);
23233841545SHajimu UMEMOTO 			if ((inp->inp_flags & IN6P_IPV6_V6ONLY) == 0 &&
233fb59c426SYoshinobu Inoue 			    IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
234fb59c426SYoshinobu Inoue 				struct sockaddr_in sin;
235fb59c426SYoshinobu Inoue 
236fb59c426SYoshinobu Inoue 				in6_sin6_2_sin(&sin, sin6);
237fb59c426SYoshinobu Inoue 				t = in_pcblookup_local(pcbinfo, sin.sin_addr,
238078b7042SBjoern A. Zeeb 				    lport, wild, cred);
23956e6821eSOlivier Houchard 				if (t && t->inp_vflag & INP_TIMEWAIT) {
24056e6821eSOlivier Houchard 					if ((reuseport &
24156e6821eSOlivier Houchard 					    intotw(t)->tw_so_options) == 0 &&
24256e6821eSOlivier Houchard 					    (ntohl(t->inp_laddr.s_addr) !=
24356e6821eSOlivier Houchard 					     INADDR_ANY || ((inp->inp_vflag &
24456e6821eSOlivier Houchard 					     INP_IPV6PROTO) ==
24556e6821eSOlivier Houchard 					     (t->inp_vflag & INP_IPV6PROTO))))
24656e6821eSOlivier Houchard 						return (EADDRINUSE);
24756e6821eSOlivier Houchard 				}
24856e6821eSOlivier Houchard 				else if (t &&
2494cc20ab1SSeigo Tanimura 				    (reuseport & t->inp_socket->so_options)
25056e6821eSOlivier Houchard 				    == 0 && (ntohl(t->inp_laddr.s_addr) !=
25156e6821eSOlivier Houchard 				    INADDR_ANY || INP_SOCKAF(so) ==
2524cc20ab1SSeigo Tanimura 				     INP_SOCKAF(t->inp_socket)))
253fb59c426SYoshinobu Inoue 					return (EADDRINUSE);
254fb59c426SYoshinobu Inoue 			}
25582cd038dSYoshinobu Inoue 		}
25682cd038dSYoshinobu Inoue 		inp->in6p_laddr = sin6->sin6_addr;
25782cd038dSYoshinobu Inoue 	}
25882cd038dSYoshinobu Inoue 	if (lport == 0) {
259686cdd19SJun-ichiro itojun Hagino 		int e;
260b0330ed9SPawel Jakub Dawidek 		if ((e = in6_pcbsetport(&inp->in6p_laddr, inp, cred)) != 0)
261686cdd19SJun-ichiro itojun Hagino 			return (e);
26255fd3bafSBjoern A. Zeeb 	} else {
26382cd038dSYoshinobu Inoue 		inp->inp_lport = lport;
26482cd038dSYoshinobu Inoue 		if (in_pcbinshash(inp) != 0) {
26582cd038dSYoshinobu Inoue 			inp->in6p_laddr = in6addr_any;
26682cd038dSYoshinobu Inoue 			inp->inp_lport = 0;
26782cd038dSYoshinobu Inoue 			return (EAGAIN);
26882cd038dSYoshinobu Inoue 		}
269686cdd19SJun-ichiro itojun Hagino 	}
27082cd038dSYoshinobu Inoue 	return (0);
27182cd038dSYoshinobu Inoue }
27282cd038dSYoshinobu Inoue 
27382cd038dSYoshinobu Inoue /*
27482cd038dSYoshinobu Inoue  *   Transform old in6_pcbconnect() into an inner subroutine for new
27582cd038dSYoshinobu Inoue  *   in6_pcbconnect(): Do some validity-checking on the remote
27682cd038dSYoshinobu Inoue  *   address (in mbuf 'nam') and then determine local host address
27782cd038dSYoshinobu Inoue  *   (i.e., which interface) to use to access that remote host.
27882cd038dSYoshinobu Inoue  *
27982cd038dSYoshinobu Inoue  *   This preserves definition of in6_pcbconnect(), while supporting a
28082cd038dSYoshinobu Inoue  *   slightly different version for T/TCP.  (This is more than
28182cd038dSYoshinobu Inoue  *   a bit of a kludge, but cleaning up the internal interfaces would
28282cd038dSYoshinobu Inoue  *   have forced minor changes in every protocol).
28382cd038dSYoshinobu Inoue  */
28482cd038dSYoshinobu Inoue int
2851272577eSXin LI in6_pcbladdr(register struct inpcb *inp, struct sockaddr *nam,
2861272577eSXin LI     struct in6_addr **plocal_addr6)
28782cd038dSYoshinobu Inoue {
2888b615593SMarko Zec 	INIT_VNET_INET6(inp->inp_vnet);
28982cd038dSYoshinobu Inoue 	register struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)nam;
29082cd038dSYoshinobu Inoue 	int error = 0;
291a1f7e5f8SHajimu UMEMOTO 	struct ifnet *ifp = NULL;
292a1f7e5f8SHajimu UMEMOTO 	int scope_ambiguous = 0;
29382cd038dSYoshinobu Inoue 
2948deea4a8SRobert Watson 	INP_INFO_WLOCK_ASSERT(inp->inp_pcbinfo);
2958501a69cSRobert Watson 	INP_WLOCK_ASSERT(inp);
2968deea4a8SRobert Watson 
29782cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof (*sin6))
29882cd038dSYoshinobu Inoue 		return (EINVAL);
29982cd038dSYoshinobu Inoue 	if (sin6->sin6_family != AF_INET6)
30082cd038dSYoshinobu Inoue 		return (EAFNOSUPPORT);
30182cd038dSYoshinobu Inoue 	if (sin6->sin6_port == 0)
30282cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
30382cd038dSYoshinobu Inoue 
304603724d3SBjoern A. Zeeb 	if (sin6->sin6_scope_id == 0 && !V_ip6_use_defzone)
305a1f7e5f8SHajimu UMEMOTO 		scope_ambiguous = 1;
306603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(sin6, V_ip6_use_defzone)) != 0)
307a1f7e5f8SHajimu UMEMOTO 		return(error);
308a1f7e5f8SHajimu UMEMOTO 
309603724d3SBjoern A. Zeeb 	if (V_in6_ifaddr) {
31082cd038dSYoshinobu Inoue 		/*
31182cd038dSYoshinobu Inoue 		 * If the destination address is UNSPECIFIED addr,
31282cd038dSYoshinobu Inoue 		 * use the loopback addr, e.g ::1.
31382cd038dSYoshinobu Inoue 		 */
31482cd038dSYoshinobu Inoue 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
31582cd038dSYoshinobu Inoue 			sin6->sin6_addr = in6addr_loopback;
31682cd038dSYoshinobu Inoue 	}
317a1f7e5f8SHajimu UMEMOTO 
31882cd038dSYoshinobu Inoue 	/*
31982cd038dSYoshinobu Inoue 	 * XXX: in6_selectsrc might replace the bound local address
32082cd038dSYoshinobu Inoue 	 * with the address specified by setsockopt(IPV6_PKTINFO).
32182cd038dSYoshinobu Inoue 	 * Is it the intended behavior?
32282cd038dSYoshinobu Inoue 	 */
32382cd038dSYoshinobu Inoue 	*plocal_addr6 = in6_selectsrc(sin6, inp->in6p_outputopts,
324f2f877d3SBjoern A. Zeeb 				      inp, NULL,
32586d02c5cSBjoern A. Zeeb 				      inp->inp_cred,
326f2f877d3SBjoern A. Zeeb 				      &ifp, &error);
327a1f7e5f8SHajimu UMEMOTO 	if (ifp && scope_ambiguous &&
328a1f7e5f8SHajimu UMEMOTO 	    (error = in6_setscope(&sin6->sin6_addr, ifp, NULL)) != 0) {
329a1f7e5f8SHajimu UMEMOTO 		return(error);
330a1f7e5f8SHajimu UMEMOTO 	}
331a1f7e5f8SHajimu UMEMOTO 
33255fd3bafSBjoern A. Zeeb 	if (*plocal_addr6 == NULL) {
33382cd038dSYoshinobu Inoue 		if (error == 0)
33482cd038dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
33582cd038dSYoshinobu Inoue 		return (error);
33682cd038dSYoshinobu Inoue 	}
33782cd038dSYoshinobu Inoue 	/*
33882cd038dSYoshinobu Inoue 	 * Don't do pcblookup call here; return interface in
33982cd038dSYoshinobu Inoue 	 * plocal_addr6
34082cd038dSYoshinobu Inoue 	 * and exit to caller, that will do the lookup.
34182cd038dSYoshinobu Inoue 	 */
342a1f7e5f8SHajimu UMEMOTO 
34382cd038dSYoshinobu Inoue 	return (0);
34482cd038dSYoshinobu Inoue }
34582cd038dSYoshinobu Inoue 
34682cd038dSYoshinobu Inoue /*
34782cd038dSYoshinobu Inoue  * Outer subroutine:
34882cd038dSYoshinobu Inoue  * Connect from a socket to a specified address.
34982cd038dSYoshinobu Inoue  * Both address and port must be specified in argument sin.
35082cd038dSYoshinobu Inoue  * If don't have a local address for this socket yet,
35182cd038dSYoshinobu Inoue  * then pick one.
35282cd038dSYoshinobu Inoue  */
35382cd038dSYoshinobu Inoue int
3541272577eSXin LI in6_pcbconnect(register struct inpcb *inp, struct sockaddr *nam,
3551272577eSXin LI     struct ucred *cred)
35682cd038dSYoshinobu Inoue {
35782cd038dSYoshinobu Inoue 	struct in6_addr *addr6;
35882cd038dSYoshinobu Inoue 	register struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)nam;
35982cd038dSYoshinobu Inoue 	int error;
36082cd038dSYoshinobu Inoue 
36107385abdSRobert Watson 	INP_INFO_WLOCK_ASSERT(inp->inp_pcbinfo);
3628501a69cSRobert Watson 	INP_WLOCK_ASSERT(inp);
36307385abdSRobert Watson 
36482cd038dSYoshinobu Inoue 	/*
36582cd038dSYoshinobu Inoue 	 * Call inner routine, to assign local interface address.
36688ff5695SSUZUKI Shinsuke 	 * in6_pcbladdr() may automatically fill in sin6_scope_id.
36782cd038dSYoshinobu Inoue 	 */
36882cd038dSYoshinobu Inoue 	if ((error = in6_pcbladdr(inp, nam, &addr6)) != 0)
36982cd038dSYoshinobu Inoue 		return (error);
37082cd038dSYoshinobu Inoue 
37182cd038dSYoshinobu Inoue 	if (in6_pcblookup_hash(inp->inp_pcbinfo, &sin6->sin6_addr,
37282cd038dSYoshinobu Inoue 			       sin6->sin6_port,
37382cd038dSYoshinobu Inoue 			      IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)
37482cd038dSYoshinobu Inoue 			      ? addr6 : &inp->in6p_laddr,
37582cd038dSYoshinobu Inoue 			      inp->inp_lport, 0, NULL) != NULL) {
37682cd038dSYoshinobu Inoue 		return (EADDRINUSE);
37782cd038dSYoshinobu Inoue 	}
37882cd038dSYoshinobu Inoue 	if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) {
37982cd038dSYoshinobu Inoue 		if (inp->inp_lport == 0) {
380b0330ed9SPawel Jakub Dawidek 			error = in6_pcbbind(inp, (struct sockaddr *)0, cred);
38182cd038dSYoshinobu Inoue 			if (error)
38282cd038dSYoshinobu Inoue 				return (error);
38382cd038dSYoshinobu Inoue 		}
38482cd038dSYoshinobu Inoue 		inp->in6p_laddr = *addr6;
38582cd038dSYoshinobu Inoue 	}
38682cd038dSYoshinobu Inoue 	inp->in6p_faddr = sin6->sin6_addr;
38782cd038dSYoshinobu Inoue 	inp->inp_fport = sin6->sin6_port;
38833841545SHajimu UMEMOTO 	/* update flowinfo - draft-itojun-ipv6-flowlabel-api-00 */
38933841545SHajimu UMEMOTO 	inp->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
39033841545SHajimu UMEMOTO 	if (inp->in6p_flags & IN6P_AUTOFLOWLABEL)
391fb59c426SYoshinobu Inoue 		inp->in6p_flowinfo |=
392b79274baSHajimu UMEMOTO 		    (htonl(ip6_randomflowlabel()) & IPV6_FLOWLABEL_MASK);
39382cd038dSYoshinobu Inoue 
39482cd038dSYoshinobu Inoue 	in_pcbrehash(inp);
3952cb64cb2SGeorge V. Neville-Neil 
39682cd038dSYoshinobu Inoue 	return (0);
39782cd038dSYoshinobu Inoue }
39882cd038dSYoshinobu Inoue 
39982cd038dSYoshinobu Inoue void
4001272577eSXin LI in6_pcbdisconnect(struct inpcb *inp)
40182cd038dSYoshinobu Inoue {
40207385abdSRobert Watson 
40307385abdSRobert Watson 	INP_INFO_WLOCK_ASSERT(inp->inp_pcbinfo);
4048501a69cSRobert Watson 	INP_WLOCK_ASSERT(inp);
40507385abdSRobert Watson 
40682cd038dSYoshinobu Inoue 	bzero((caddr_t)&inp->in6p_faddr, sizeof(inp->in6p_faddr));
40782cd038dSYoshinobu Inoue 	inp->inp_fport = 0;
40833841545SHajimu UMEMOTO 	/* clear flowinfo - draft-itojun-ipv6-flowlabel-api-00 */
40933841545SHajimu UMEMOTO 	inp->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
41082cd038dSYoshinobu Inoue 	in_pcbrehash(inp);
41182cd038dSYoshinobu Inoue }
41282cd038dSYoshinobu Inoue 
41382cd038dSYoshinobu Inoue void
4144c7c478dSRobert Watson in6_pcbdetach(struct inpcb *inp)
41582cd038dSYoshinobu Inoue {
4164c7c478dSRobert Watson 
4174c7c478dSRobert Watson 	KASSERT(inp->inp_socket != NULL, ("in6_pcbdetach: inp_socket == NULL"));
4184c7c478dSRobert Watson 	inp->inp_socket->so_pcb = NULL;
4194c7c478dSRobert Watson 	inp->inp_socket = NULL;
4204c7c478dSRobert Watson }
4214c7c478dSRobert Watson 
4224c7c478dSRobert Watson void
4234c7c478dSRobert Watson in6_pcbfree(struct inpcb *inp)
4244c7c478dSRobert Watson {
42582cd038dSYoshinobu Inoue 	struct inpcbinfo *ipi = inp->inp_pcbinfo;
42682cd038dSYoshinobu Inoue 
4274c7c478dSRobert Watson 	KASSERT(inp->inp_socket == NULL, ("in6_pcbfree: inp_socket != NULL"));
42807385abdSRobert Watson 	INP_INFO_WLOCK_ASSERT(inp->inp_pcbinfo);
4298501a69cSRobert Watson 	INP_WLOCK_ASSERT(inp);
43007385abdSRobert Watson 
431b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
432333aa64dSBrian Feldman 	if (inp->in6p_sp != NULL)
43382cd038dSYoshinobu Inoue 		ipsec6_delete_pcbpolicy(inp);
434b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
43582cd038dSYoshinobu Inoue 	inp->inp_gencnt = ++ipi->ipi_gencnt;
43682cd038dSYoshinobu Inoue 	in_pcbremlists(inp);
43733841545SHajimu UMEMOTO 	ip6_freepcbopts(inp->in6p_outputopts);
43833841545SHajimu UMEMOTO 	ip6_freemoptions(inp->in6p_moptions);
439fb59c426SYoshinobu Inoue 	/* Check and free IPv4 related resources in case of mapped addr */
440fb59c426SYoshinobu Inoue 	if (inp->inp_options)
441fb59c426SYoshinobu Inoue 		(void)m_free(inp->inp_options);
44271498f30SBruce M Simpson 	if (inp->inp_moptions != NULL)
44371498f30SBruce M Simpson 		inp_freemoptions(inp->inp_moptions);
44482cd038dSYoshinobu Inoue 	inp->inp_vflag = 0;
4458b953b3fSRobert Watson #ifdef MAC
4468b953b3fSRobert Watson 	mac_inpcb_destroy(inp);
4478b953b3fSRobert Watson #endif
4488501a69cSRobert Watson 	INP_WUNLOCK(inp);
44994540027SJeff Roberson 	uma_zfree(ipi->ipi_zone, inp);
45082cd038dSYoshinobu Inoue }
45182cd038dSYoshinobu Inoue 
45226ef6ac4SDon Lewis struct sockaddr *
4531272577eSXin LI in6_sockaddr(in_port_t port, struct in6_addr *addr_p)
45426ef6ac4SDon Lewis {
45526ef6ac4SDon Lewis 	struct sockaddr_in6 *sin6;
45626ef6ac4SDon Lewis 
457a163d034SWarner Losh 	MALLOC(sin6, struct sockaddr_in6 *, sizeof *sin6, M_SONAME, M_WAITOK);
45826ef6ac4SDon Lewis 	bzero(sin6, sizeof *sin6);
45926ef6ac4SDon Lewis 	sin6->sin6_family = AF_INET6;
46026ef6ac4SDon Lewis 	sin6->sin6_len = sizeof(*sin6);
46126ef6ac4SDon Lewis 	sin6->sin6_port = port;
46226ef6ac4SDon Lewis 	sin6->sin6_addr = *addr_p;
463a1f7e5f8SHajimu UMEMOTO 	(void)sa6_recoverscope(sin6); /* XXX: should catch errors */
46426ef6ac4SDon Lewis 
46526ef6ac4SDon Lewis 	return (struct sockaddr *)sin6;
46626ef6ac4SDon Lewis }
46726ef6ac4SDon Lewis 
46826ef6ac4SDon Lewis struct sockaddr *
4691272577eSXin LI in6_v4mapsin6_sockaddr(in_port_t port, struct in_addr *addr_p)
47026ef6ac4SDon Lewis {
47126ef6ac4SDon Lewis 	struct sockaddr_in sin;
47226ef6ac4SDon Lewis 	struct sockaddr_in6 *sin6_p;
47326ef6ac4SDon Lewis 
47426ef6ac4SDon Lewis 	bzero(&sin, sizeof sin);
47526ef6ac4SDon Lewis 	sin.sin_family = AF_INET;
47626ef6ac4SDon Lewis 	sin.sin_len = sizeof(sin);
47726ef6ac4SDon Lewis 	sin.sin_port = port;
47826ef6ac4SDon Lewis 	sin.sin_addr = *addr_p;
47926ef6ac4SDon Lewis 
48026ef6ac4SDon Lewis 	MALLOC(sin6_p, struct sockaddr_in6 *, sizeof *sin6_p, M_SONAME,
481a163d034SWarner Losh 		M_WAITOK);
48226ef6ac4SDon Lewis 	in6_sin_2_v4mapsin6(&sin, sin6_p);
48326ef6ac4SDon Lewis 
48426ef6ac4SDon Lewis 	return (struct sockaddr *)sin6_p;
48526ef6ac4SDon Lewis }
48626ef6ac4SDon Lewis 
48782cd038dSYoshinobu Inoue int
4881272577eSXin LI in6_getsockaddr(struct socket *so, struct sockaddr **nam)
48982cd038dSYoshinobu Inoue {
49082cd038dSYoshinobu Inoue 	register struct inpcb *inp;
49126ef6ac4SDon Lewis 	struct in6_addr addr;
49226ef6ac4SDon Lewis 	in_port_t port;
49382cd038dSYoshinobu Inoue 
49482cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
49554d642bbSRobert Watson 	KASSERT(inp != NULL, ("in6_getsockaddr: inp == NULL"));
49648477723SRobert Watson 
4978328afb7SRobert Watson 	INP_RLOCK(inp);
49826ef6ac4SDon Lewis 	port = inp->inp_lport;
49926ef6ac4SDon Lewis 	addr = inp->in6p_laddr;
5008328afb7SRobert Watson 	INP_RUNLOCK(inp);
50182cd038dSYoshinobu Inoue 
50226ef6ac4SDon Lewis 	*nam = in6_sockaddr(port, &addr);
50382cd038dSYoshinobu Inoue 	return 0;
50482cd038dSYoshinobu Inoue }
50582cd038dSYoshinobu Inoue 
50682cd038dSYoshinobu Inoue int
5071272577eSXin LI in6_getpeeraddr(struct socket *so, struct sockaddr **nam)
50882cd038dSYoshinobu Inoue {
50982cd038dSYoshinobu Inoue 	struct inpcb *inp;
51026ef6ac4SDon Lewis 	struct in6_addr addr;
51126ef6ac4SDon Lewis 	in_port_t port;
51282cd038dSYoshinobu Inoue 
51382cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
51454d642bbSRobert Watson 	KASSERT(inp != NULL, ("in6_getpeeraddr: inp == NULL"));
51548477723SRobert Watson 
5168328afb7SRobert Watson 	INP_RLOCK(inp);
51726ef6ac4SDon Lewis 	port = inp->inp_fport;
51826ef6ac4SDon Lewis 	addr = inp->in6p_faddr;
5198328afb7SRobert Watson 	INP_RUNLOCK(inp);
52082cd038dSYoshinobu Inoue 
52126ef6ac4SDon Lewis 	*nam = in6_sockaddr(port, &addr);
52282cd038dSYoshinobu Inoue 	return 0;
52382cd038dSYoshinobu Inoue }
52482cd038dSYoshinobu Inoue 
52582cd038dSYoshinobu Inoue int
52682cd038dSYoshinobu Inoue in6_mapped_sockaddr(struct socket *so, struct sockaddr **nam)
52782cd038dSYoshinobu Inoue {
52848477723SRobert Watson 	struct	inpcb *inp;
52982cd038dSYoshinobu Inoue 	int	error;
53082cd038dSYoshinobu Inoue 
53148477723SRobert Watson 	inp = sotoinpcb(so);
53248477723SRobert Watson 	KASSERT(inp != NULL, ("in6_mapped_sockaddr: inp == NULL"));
53348477723SRobert Watson 
5345fac4178SHajimu UMEMOTO 	if ((inp->inp_vflag & (INP_IPV4 | INP_IPV6)) == INP_IPV4) {
53554d642bbSRobert Watson 		error = in_getsockaddr(so, nam);
536369dc8ceSEivind Eklund 		if (error == 0)
53782cd038dSYoshinobu Inoue 			in6_sin_2_v4mapsin6_in_sock(nam);
5387efe5d92SHajimu UMEMOTO 	} else {
53954d642bbSRobert Watson 		/* scope issues will be handled in in6_getsockaddr(). */
54054d642bbSRobert Watson 		error = in6_getsockaddr(so, nam);
5417efe5d92SHajimu UMEMOTO 	}
54282cd038dSYoshinobu Inoue 
54382cd038dSYoshinobu Inoue 	return error;
54482cd038dSYoshinobu Inoue }
54582cd038dSYoshinobu Inoue 
54682cd038dSYoshinobu Inoue int
54782cd038dSYoshinobu Inoue in6_mapped_peeraddr(struct socket *so, struct sockaddr **nam)
54882cd038dSYoshinobu Inoue {
54948477723SRobert Watson 	struct	inpcb *inp;
55082cd038dSYoshinobu Inoue 	int	error;
55182cd038dSYoshinobu Inoue 
55248477723SRobert Watson 	inp = sotoinpcb(so);
55348477723SRobert Watson 	KASSERT(inp != NULL, ("in6_mapped_peeraddr: inp == NULL"));
55448477723SRobert Watson 
5555fac4178SHajimu UMEMOTO 	if ((inp->inp_vflag & (INP_IPV4 | INP_IPV6)) == INP_IPV4) {
55654d642bbSRobert Watson 		error = in_getpeeraddr(so, nam);
557369dc8ceSEivind Eklund 		if (error == 0)
55882cd038dSYoshinobu Inoue 			in6_sin_2_v4mapsin6_in_sock(nam);
55982cd038dSYoshinobu Inoue 	} else
56054d642bbSRobert Watson 	/* scope issues will be handled in in6_getpeeraddr(). */
56154d642bbSRobert Watson 	error = in6_getpeeraddr(so, nam);
56282cd038dSYoshinobu Inoue 
56382cd038dSYoshinobu Inoue 	return error;
56482cd038dSYoshinobu Inoue }
56582cd038dSYoshinobu Inoue 
56682cd038dSYoshinobu Inoue /*
56782cd038dSYoshinobu Inoue  * Pass some notification to all connections of a protocol
56882cd038dSYoshinobu Inoue  * associated with address dst.  The local address and/or port numbers
56982cd038dSYoshinobu Inoue  * may be specified to limit the search.  The "usual action" will be
57082cd038dSYoshinobu Inoue  * taken, depending on the ctlinput cmd.  The caller must filter any
57182cd038dSYoshinobu Inoue  * cmds that are uninteresting (e.g., no error in the map).
57282cd038dSYoshinobu Inoue  * Call the protocol specific routine (if any) to report
57382cd038dSYoshinobu Inoue  * any errors for each matching socket.
57482cd038dSYoshinobu Inoue  */
57582cd038dSYoshinobu Inoue void
5761272577eSXin LI in6_pcbnotify(struct inpcbinfo *pcbinfo, struct sockaddr *dst,
5771272577eSXin LI     u_int fport_arg, const struct sockaddr *src, u_int lport_arg,
5781272577eSXin LI     int cmd, void *cmdarg,
5799233d8f3SDavid E. O'Brien     struct inpcb *(*notify)(struct inpcb *, int))
58082cd038dSYoshinobu Inoue {
581f457d580SRobert Watson 	struct inpcb *inp, *inp_temp;
58233841545SHajimu UMEMOTO 	struct sockaddr_in6 sa6_src, *sa6_dst;
58382cd038dSYoshinobu Inoue 	u_short	fport = fport_arg, lport = lport_arg;
58433841545SHajimu UMEMOTO 	u_int32_t flowinfo;
58548477723SRobert Watson 	int errno;
58682cd038dSYoshinobu Inoue 
58778f94aa9SRuslan Ermilov 	if ((unsigned)cmd >= PRC_NCMDS || dst->sa_family != AF_INET6)
58882cd038dSYoshinobu Inoue 		return;
58933841545SHajimu UMEMOTO 
59033841545SHajimu UMEMOTO 	sa6_dst = (struct sockaddr_in6 *)dst;
59133841545SHajimu UMEMOTO 	if (IN6_IS_ADDR_UNSPECIFIED(&sa6_dst->sin6_addr))
59282cd038dSYoshinobu Inoue 		return;
59382cd038dSYoshinobu Inoue 
59482cd038dSYoshinobu Inoue 	/*
59533841545SHajimu UMEMOTO 	 * note that src can be NULL when we get notify by local fragmentation.
59633841545SHajimu UMEMOTO 	 */
597c4c0c592SAlfred Perlstein 	sa6_src = (src == NULL) ? sa6_any : *(const struct sockaddr_in6 *)src;
59833841545SHajimu UMEMOTO 	flowinfo = sa6_src.sin6_flowinfo;
59933841545SHajimu UMEMOTO 
60033841545SHajimu UMEMOTO 	/*
60182cd038dSYoshinobu Inoue 	 * Redirects go to all references to the destination,
602686cdd19SJun-ichiro itojun Hagino 	 * and use in6_rtchange to invalidate the route cache.
603686cdd19SJun-ichiro itojun Hagino 	 * Dead host indications: also use in6_rtchange to invalidate
604686cdd19SJun-ichiro itojun Hagino 	 * the cache, and deliver the error to all the sockets.
60582cd038dSYoshinobu Inoue 	 * Otherwise, if we have knowledge of the local port and address,
60682cd038dSYoshinobu Inoue 	 * deliver only to that socket.
60782cd038dSYoshinobu Inoue 	 */
60882cd038dSYoshinobu Inoue 	if (PRC_IS_REDIRECT(cmd) || cmd == PRC_HOSTDEAD) {
60982cd038dSYoshinobu Inoue 		fport = 0;
61082cd038dSYoshinobu Inoue 		lport = 0;
61133841545SHajimu UMEMOTO 		bzero((caddr_t)&sa6_src.sin6_addr, sizeof(sa6_src.sin6_addr));
612686cdd19SJun-ichiro itojun Hagino 
61333841545SHajimu UMEMOTO 		if (cmd != PRC_HOSTDEAD)
61433841545SHajimu UMEMOTO 			notify = in6_rtchange;
61582cd038dSYoshinobu Inoue 	}
61682cd038dSYoshinobu Inoue 	errno = inet6ctlerrmap[cmd];
617f31f65a7SRobert Watson 	INP_INFO_WLOCK(pcbinfo);
618f457d580SRobert Watson 	LIST_FOREACH_SAFE(inp, pcbinfo->ipi_listhead, inp_list, inp_temp) {
6198501a69cSRobert Watson 		INP_WLOCK(inp);
620f31f65a7SRobert Watson 		if ((inp->inp_vflag & INP_IPV6) == 0) {
6218501a69cSRobert Watson 			INP_WUNLOCK(inp);
62282cd038dSYoshinobu Inoue 			continue;
623f31f65a7SRobert Watson 		}
624686cdd19SJun-ichiro itojun Hagino 
625686cdd19SJun-ichiro itojun Hagino 		/*
626efddf5c6SHajimu UMEMOTO 		 * If the error designates a new path MTU for a destination
627efddf5c6SHajimu UMEMOTO 		 * and the application (associated with this socket) wanted to
628efddf5c6SHajimu UMEMOTO 		 * know the value, notify. Note that we notify for all
629efddf5c6SHajimu UMEMOTO 		 * disconnected sockets if the corresponding application
630efddf5c6SHajimu UMEMOTO 		 * wanted. This is because some UDP applications keep sending
631efddf5c6SHajimu UMEMOTO 		 * sockets disconnected.
632efddf5c6SHajimu UMEMOTO 		 * XXX: should we avoid to notify the value to TCP sockets?
633efddf5c6SHajimu UMEMOTO 		 */
634efddf5c6SHajimu UMEMOTO 		if (cmd == PRC_MSGSIZE && (inp->inp_flags & IN6P_MTU) != 0 &&
635efddf5c6SHajimu UMEMOTO 		    (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) ||
636efddf5c6SHajimu UMEMOTO 		     IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, &sa6_dst->sin6_addr))) {
637efddf5c6SHajimu UMEMOTO 			ip6_notify_pmtu(inp, (struct sockaddr_in6 *)dst,
638efddf5c6SHajimu UMEMOTO 					(u_int32_t *)cmdarg);
639efddf5c6SHajimu UMEMOTO 		}
640efddf5c6SHajimu UMEMOTO 
641efddf5c6SHajimu UMEMOTO 		/*
64233841545SHajimu UMEMOTO 		 * Detect if we should notify the error. If no source and
64333841545SHajimu UMEMOTO 		 * destination ports are specifed, but non-zero flowinfo and
64433841545SHajimu UMEMOTO 		 * local address match, notify the error. This is the case
64533841545SHajimu UMEMOTO 		 * when the error is delivered with an encrypted buffer
64633841545SHajimu UMEMOTO 		 * by ESP. Otherwise, just compare addresses and ports
64733841545SHajimu UMEMOTO 		 * as usual.
648686cdd19SJun-ichiro itojun Hagino 		 */
64933841545SHajimu UMEMOTO 		if (lport == 0 && fport == 0 && flowinfo &&
65033841545SHajimu UMEMOTO 		    inp->inp_socket != NULL &&
65133841545SHajimu UMEMOTO 		    flowinfo == (inp->in6p_flowinfo & IPV6_FLOWLABEL_MASK) &&
65233841545SHajimu UMEMOTO 		    IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, &sa6_src.sin6_addr))
65333841545SHajimu UMEMOTO 			goto do_notify;
65433841545SHajimu UMEMOTO 		else if (!IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr,
65533841545SHajimu UMEMOTO 					     &sa6_dst->sin6_addr) ||
65682cd038dSYoshinobu Inoue 			 inp->inp_socket == 0 ||
65782cd038dSYoshinobu Inoue 			 (lport && inp->inp_lport != lport) ||
65833841545SHajimu UMEMOTO 			 (!IN6_IS_ADDR_UNSPECIFIED(&sa6_src.sin6_addr) &&
65933841545SHajimu UMEMOTO 			  !IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr,
66033841545SHajimu UMEMOTO 					      &sa6_src.sin6_addr)) ||
661f31f65a7SRobert Watson 			 (fport && inp->inp_fport != fport)) {
6628501a69cSRobert Watson 			INP_WUNLOCK(inp);
66382cd038dSYoshinobu Inoue 			continue;
664f31f65a7SRobert Watson 		}
665686cdd19SJun-ichiro itojun Hagino 
66633841545SHajimu UMEMOTO 	  do_notify:
6675a019265SRobert Watson 		if (notify) {
6685a019265SRobert Watson 			if ((*notify)(inp, errno))
6698501a69cSRobert Watson 				INP_WUNLOCK(inp);
6705a019265SRobert Watson 		} else
6718501a69cSRobert Watson 			INP_WUNLOCK(inp);
67282cd038dSYoshinobu Inoue 	}
673f31f65a7SRobert Watson 	INP_INFO_WUNLOCK(pcbinfo);
67482cd038dSYoshinobu Inoue }
67582cd038dSYoshinobu Inoue 
67682cd038dSYoshinobu Inoue /*
67782cd038dSYoshinobu Inoue  * Lookup a PCB based on the local address and port.
67882cd038dSYoshinobu Inoue  */
67982cd038dSYoshinobu Inoue struct inpcb *
6801272577eSXin LI in6_pcblookup_local(struct inpcbinfo *pcbinfo, struct in6_addr *laddr,
681078b7042SBjoern A. Zeeb     u_short lport, int wild_okay, struct ucred *cred)
68282cd038dSYoshinobu Inoue {
68382cd038dSYoshinobu Inoue 	register struct inpcb *inp;
68482cd038dSYoshinobu Inoue 	int matchwild = 3, wildcard;
68582cd038dSYoshinobu Inoue 
6868deea4a8SRobert Watson 	INP_INFO_WLOCK_ASSERT(pcbinfo);
6878deea4a8SRobert Watson 
68882cd038dSYoshinobu Inoue 	if (!wild_okay) {
68982cd038dSYoshinobu Inoue 		struct inpcbhead *head;
69082cd038dSYoshinobu Inoue 		/*
69182cd038dSYoshinobu Inoue 		 * Look for an unconnected (wildcard foreign addr) PCB that
69282cd038dSYoshinobu Inoue 		 * matches the local address and port we're looking for.
69382cd038dSYoshinobu Inoue 		 */
694712fc218SRobert Watson 		head = &pcbinfo->ipi_hashbase[INP_PCBHASH(INADDR_ANY, lport,
695712fc218SRobert Watson 		    0, pcbinfo->ipi_hashmask)];
69682cd038dSYoshinobu Inoue 		LIST_FOREACH(inp, head, inp_hash) {
697369dc8ceSEivind Eklund 			if ((inp->inp_vflag & INP_IPV6) == 0)
69882cd038dSYoshinobu Inoue 				continue;
69982cd038dSYoshinobu Inoue 			if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
70082cd038dSYoshinobu Inoue 			    IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) &&
70182cd038dSYoshinobu Inoue 			    inp->inp_lport == lport) {
70282cd038dSYoshinobu Inoue 				/*
70382cd038dSYoshinobu Inoue 				 * Found.
70482cd038dSYoshinobu Inoue 				 */
70582cd038dSYoshinobu Inoue 				return (inp);
70682cd038dSYoshinobu Inoue 			}
70782cd038dSYoshinobu Inoue 		}
70882cd038dSYoshinobu Inoue 		/*
70982cd038dSYoshinobu Inoue 		 * Not found.
71082cd038dSYoshinobu Inoue 		 */
71182cd038dSYoshinobu Inoue 		return (NULL);
71282cd038dSYoshinobu Inoue 	} else {
71382cd038dSYoshinobu Inoue 		struct inpcbporthead *porthash;
71482cd038dSYoshinobu Inoue 		struct inpcbport *phd;
71582cd038dSYoshinobu Inoue 		struct inpcb *match = NULL;
71682cd038dSYoshinobu Inoue 		/*
71782cd038dSYoshinobu Inoue 		 * Best fit PCB lookup.
71882cd038dSYoshinobu Inoue 		 *
71982cd038dSYoshinobu Inoue 		 * First see if this local port is in use by looking on the
72082cd038dSYoshinobu Inoue 		 * port hash list.
72182cd038dSYoshinobu Inoue 		 */
722712fc218SRobert Watson 		porthash = &pcbinfo->ipi_porthashbase[INP_PCBPORTHASH(lport,
723712fc218SRobert Watson 		    pcbinfo->ipi_porthashmask)];
72482cd038dSYoshinobu Inoue 		LIST_FOREACH(phd, porthash, phd_hash) {
72582cd038dSYoshinobu Inoue 			if (phd->phd_port == lport)
72682cd038dSYoshinobu Inoue 				break;
72782cd038dSYoshinobu Inoue 		}
72882cd038dSYoshinobu Inoue 		if (phd != NULL) {
72982cd038dSYoshinobu Inoue 			/*
73082cd038dSYoshinobu Inoue 			 * Port is in use by one or more PCBs. Look for best
73182cd038dSYoshinobu Inoue 			 * fit.
73282cd038dSYoshinobu Inoue 			 */
73382cd038dSYoshinobu Inoue 			LIST_FOREACH(inp, &phd->phd_pcblist, inp_portlist) {
73482cd038dSYoshinobu Inoue 				wildcard = 0;
735369dc8ceSEivind Eklund 				if ((inp->inp_vflag & INP_IPV6) == 0)
73682cd038dSYoshinobu Inoue 					continue;
73782cd038dSYoshinobu Inoue 				if (!IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr))
73882cd038dSYoshinobu Inoue 					wildcard++;
73982cd038dSYoshinobu Inoue 				if (!IN6_IS_ADDR_UNSPECIFIED(
74082cd038dSYoshinobu Inoue 					&inp->in6p_laddr)) {
74182cd038dSYoshinobu Inoue 					if (IN6_IS_ADDR_UNSPECIFIED(laddr))
74282cd038dSYoshinobu Inoue 						wildcard++;
74382cd038dSYoshinobu Inoue 					else if (!IN6_ARE_ADDR_EQUAL(
74482cd038dSYoshinobu Inoue 						&inp->in6p_laddr, laddr))
74582cd038dSYoshinobu Inoue 						continue;
74682cd038dSYoshinobu Inoue 				} else {
74782cd038dSYoshinobu Inoue 					if (!IN6_IS_ADDR_UNSPECIFIED(laddr))
74882cd038dSYoshinobu Inoue 						wildcard++;
74982cd038dSYoshinobu Inoue 				}
75082cd038dSYoshinobu Inoue 				if (wildcard < matchwild) {
75182cd038dSYoshinobu Inoue 					match = inp;
75282cd038dSYoshinobu Inoue 					matchwild = wildcard;
75382cd038dSYoshinobu Inoue 					if (matchwild == 0) {
75482cd038dSYoshinobu Inoue 						break;
75582cd038dSYoshinobu Inoue 					}
75682cd038dSYoshinobu Inoue 				}
75782cd038dSYoshinobu Inoue 			}
75882cd038dSYoshinobu Inoue 		}
75982cd038dSYoshinobu Inoue 		return (match);
76082cd038dSYoshinobu Inoue 	}
76182cd038dSYoshinobu Inoue }
76282cd038dSYoshinobu Inoue 
763e43cc4aeSHajimu UMEMOTO void
7641272577eSXin LI in6_pcbpurgeif0(struct inpcbinfo *pcbinfo, struct ifnet *ifp)
765e43cc4aeSHajimu UMEMOTO {
766e43cc4aeSHajimu UMEMOTO 	struct in6pcb *in6p;
767e43cc4aeSHajimu UMEMOTO 	struct ip6_moptions *im6o;
768e43cc4aeSHajimu UMEMOTO 	struct in6_multi_mship *imm, *nimm;
769e43cc4aeSHajimu UMEMOTO 
77004f20737SRobert Watson 	INP_INFO_RLOCK(pcbinfo);
771712fc218SRobert Watson 	LIST_FOREACH(in6p, pcbinfo->ipi_listhead, inp_list) {
7728501a69cSRobert Watson 		INP_WLOCK(in6p);
773e43cc4aeSHajimu UMEMOTO 		im6o = in6p->in6p_moptions;
774e43cc4aeSHajimu UMEMOTO 		if ((in6p->inp_vflag & INP_IPV6) &&
775e43cc4aeSHajimu UMEMOTO 		    im6o) {
776e43cc4aeSHajimu UMEMOTO 			/*
777e43cc4aeSHajimu UMEMOTO 			 * Unselect the outgoing interface if it is being
778e43cc4aeSHajimu UMEMOTO 			 * detached.
779e43cc4aeSHajimu UMEMOTO 			 */
780e43cc4aeSHajimu UMEMOTO 			if (im6o->im6o_multicast_ifp == ifp)
781e43cc4aeSHajimu UMEMOTO 				im6o->im6o_multicast_ifp = NULL;
782e43cc4aeSHajimu UMEMOTO 
783e43cc4aeSHajimu UMEMOTO 			/*
784e43cc4aeSHajimu UMEMOTO 			 * Drop multicast group membership if we joined
785e43cc4aeSHajimu UMEMOTO 			 * through the interface being detached.
786e43cc4aeSHajimu UMEMOTO 			 * XXX controversial - is it really legal for kernel
787e43cc4aeSHajimu UMEMOTO 			 * to force this?
788e43cc4aeSHajimu UMEMOTO 			 */
789e43cc4aeSHajimu UMEMOTO 			for (imm = im6o->im6o_memberships.lh_first;
790e43cc4aeSHajimu UMEMOTO 			     imm != NULL; imm = nimm) {
791e43cc4aeSHajimu UMEMOTO 				nimm = imm->i6mm_chain.le_next;
792e43cc4aeSHajimu UMEMOTO 				if (imm->i6mm_maddr->in6m_ifp == ifp) {
793e43cc4aeSHajimu UMEMOTO 					LIST_REMOVE(imm, i6mm_chain);
794e43cc4aeSHajimu UMEMOTO 					in6_delmulti(imm->i6mm_maddr);
7957ba26d99SDavid E. O'Brien 					free(imm, M_IP6MADDR);
796e43cc4aeSHajimu UMEMOTO 				}
797e43cc4aeSHajimu UMEMOTO 			}
798e43cc4aeSHajimu UMEMOTO 		}
7998501a69cSRobert Watson 		INP_WUNLOCK(in6p);
800e43cc4aeSHajimu UMEMOTO 	}
80104f20737SRobert Watson 	INP_INFO_RUNLOCK(pcbinfo);
802e43cc4aeSHajimu UMEMOTO }
803e43cc4aeSHajimu UMEMOTO 
80482cd038dSYoshinobu Inoue /*
80582cd038dSYoshinobu Inoue  * Check for alternatives when higher level complains
80682cd038dSYoshinobu Inoue  * about service problems.  For now, invalidate cached
80782cd038dSYoshinobu Inoue  * routing information.  If the route was created dynamically
80882cd038dSYoshinobu Inoue  * (by a redirect), time to try a default gateway again.
80982cd038dSYoshinobu Inoue  */
81082cd038dSYoshinobu Inoue void
8111272577eSXin LI in6_losing(struct inpcb *in6p)
81282cd038dSYoshinobu Inoue {
8131272577eSXin LI 
81482cd038dSYoshinobu Inoue 	/*
81597d8d152SAndre Oppermann 	 * We don't store route pointers in the routing table anymore
81682cd038dSYoshinobu Inoue 	 */
81797d8d152SAndre Oppermann 	return;
81882cd038dSYoshinobu Inoue }
81982cd038dSYoshinobu Inoue 
82082cd038dSYoshinobu Inoue /*
82182cd038dSYoshinobu Inoue  * After a routing change, flush old routing
82282cd038dSYoshinobu Inoue  * and allocate a (hopefully) better one.
82382cd038dSYoshinobu Inoue  */
8243ce144eaSJeffrey Hsu struct inpcb *
8251272577eSXin LI in6_rtchange(struct inpcb *inp, int errno)
82682cd038dSYoshinobu Inoue {
82782cd038dSYoshinobu Inoue 	/*
82897d8d152SAndre Oppermann 	 * We don't store route pointers in the routing table anymore
82982cd038dSYoshinobu Inoue 	 */
8303ce144eaSJeffrey Hsu 	return inp;
83182cd038dSYoshinobu Inoue }
83282cd038dSYoshinobu Inoue 
83382cd038dSYoshinobu Inoue /*
83482cd038dSYoshinobu Inoue  * Lookup PCB in hash list.
83582cd038dSYoshinobu Inoue  */
83682cd038dSYoshinobu Inoue struct inpcb *
8371272577eSXin LI in6_pcblookup_hash(struct inpcbinfo *pcbinfo, struct in6_addr *faddr,
8381272577eSXin LI     u_int fport_arg, struct in6_addr *laddr, u_int lport_arg,
8391272577eSXin LI     int wildcard, struct ifnet *ifp)
84082cd038dSYoshinobu Inoue {
84182cd038dSYoshinobu Inoue 	struct inpcbhead *head;
84282cd038dSYoshinobu Inoue 	register struct inpcb *inp;
84382cd038dSYoshinobu Inoue 	u_short fport = fport_arg, lport = lport_arg;
84433841545SHajimu UMEMOTO 	int faith;
84533841545SHajimu UMEMOTO 
8468501a69cSRobert Watson 	INP_INFO_LOCK_ASSERT(pcbinfo);
8478deea4a8SRobert Watson 
8489494d596SBrooks Davis 	if (faithprefix_p != NULL)
8499494d596SBrooks Davis 		faith = (*faithprefix_p)(laddr);
8509494d596SBrooks Davis 	else
85133841545SHajimu UMEMOTO 		faith = 0;
85282cd038dSYoshinobu Inoue 
85382cd038dSYoshinobu Inoue 	/*
85482cd038dSYoshinobu Inoue 	 * First look for an exact match.
85582cd038dSYoshinobu Inoue 	 */
856712fc218SRobert Watson 	head = &pcbinfo->ipi_hashbase[
857712fc218SRobert Watson 	    INP_PCBHASH(faddr->s6_addr32[3] /* XXX */, lport, fport,
858712fc218SRobert Watson 	    pcbinfo->ipi_hashmask)];
859cfa1ca9dSYoshinobu Inoue 	LIST_FOREACH(inp, head, inp_hash) {
860369dc8ceSEivind Eklund 		if ((inp->inp_vflag & INP_IPV6) == 0)
86182cd038dSYoshinobu Inoue 			continue;
86282cd038dSYoshinobu Inoue 		if (IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, faddr) &&
86382cd038dSYoshinobu Inoue 		    IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) &&
86482cd038dSYoshinobu Inoue 		    inp->inp_fport == fport &&
86582cd038dSYoshinobu Inoue 		    inp->inp_lport == lport) {
86682cd038dSYoshinobu Inoue 			/*
86782cd038dSYoshinobu Inoue 			 * Found.
86882cd038dSYoshinobu Inoue 			 */
86982cd038dSYoshinobu Inoue 			return (inp);
87082cd038dSYoshinobu Inoue 		}
87182cd038dSYoshinobu Inoue 	}
87282cd038dSYoshinobu Inoue 	if (wildcard) {
87382cd038dSYoshinobu Inoue 		struct inpcb *local_wild = NULL;
87482cd038dSYoshinobu Inoue 
875712fc218SRobert Watson 		head = &pcbinfo->ipi_hashbase[INP_PCBHASH(INADDR_ANY, lport,
876712fc218SRobert Watson 		    0, pcbinfo->ipi_hashmask)];
877cfa1ca9dSYoshinobu Inoue 		LIST_FOREACH(inp, head, inp_hash) {
878369dc8ceSEivind Eklund 			if ((inp->inp_vflag & INP_IPV6) == 0)
87982cd038dSYoshinobu Inoue 				continue;
88082cd038dSYoshinobu Inoue 			if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
88182cd038dSYoshinobu Inoue 			    inp->inp_lport == lport) {
88233841545SHajimu UMEMOTO 				if (faith && (inp->inp_flags & INP_FAITH) == 0)
88382cd038dSYoshinobu Inoue 					continue;
88482cd038dSYoshinobu Inoue 				if (IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr,
88582cd038dSYoshinobu Inoue 						       laddr))
88682cd038dSYoshinobu Inoue 					return (inp);
88782cd038dSYoshinobu Inoue 				else if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
88882cd038dSYoshinobu Inoue 					local_wild = inp;
88982cd038dSYoshinobu Inoue 			}
89082cd038dSYoshinobu Inoue 		}
89182cd038dSYoshinobu Inoue 		return (local_wild);
89282cd038dSYoshinobu Inoue 	}
89382cd038dSYoshinobu Inoue 
89482cd038dSYoshinobu Inoue 	/*
89582cd038dSYoshinobu Inoue 	 * Not found.
89682cd038dSYoshinobu Inoue 	 */
89782cd038dSYoshinobu Inoue 	return (NULL);
89882cd038dSYoshinobu Inoue }
89982cd038dSYoshinobu Inoue 
90082cd038dSYoshinobu Inoue void
90182cd038dSYoshinobu Inoue init_sin6(struct sockaddr_in6 *sin6, struct mbuf *m)
90282cd038dSYoshinobu Inoue {
90382cd038dSYoshinobu Inoue 	struct ip6_hdr *ip;
90482cd038dSYoshinobu Inoue 
90582cd038dSYoshinobu Inoue 	ip = mtod(m, struct ip6_hdr *);
90682cd038dSYoshinobu Inoue 	bzero(sin6, sizeof(*sin6));
90782cd038dSYoshinobu Inoue 	sin6->sin6_len = sizeof(*sin6);
90882cd038dSYoshinobu Inoue 	sin6->sin6_family = AF_INET6;
90982cd038dSYoshinobu Inoue 	sin6->sin6_addr = ip->ip6_src;
910a1f7e5f8SHajimu UMEMOTO 
911a1f7e5f8SHajimu UMEMOTO 	(void)sa6_recoverscope(sin6); /* XXX: should catch errors... */
91282cd038dSYoshinobu Inoue 
91382cd038dSYoshinobu Inoue 	return;
91482cd038dSYoshinobu Inoue }
915