1 /* 2 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the project nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 * 29 * $FreeBSD$ 30 */ 31 32 /* 33 * Copyright (c) 1982, 1986, 1991, 1993 34 * The Regents of the University of California. All rights reserved. 35 * 36 * Redistribution and use in source and binary forms, with or without 37 * modification, are permitted provided that the following conditions 38 * are met: 39 * 1. Redistributions of source code must retain the above copyright 40 * notice, this list of conditions and the following disclaimer. 41 * 2. Redistributions in binary form must reproduce the above copyright 42 * notice, this list of conditions and the following disclaimer in the 43 * documentation and/or other materials provided with the distribution. 44 * 3. All advertising materials mentioning features or use of this software 45 * must display the following acknowledgement: 46 * This product includes software developed by the University of 47 * California, Berkeley and its contributors. 48 * 4. Neither the name of the University nor the names of its contributors 49 * may be used to endorse or promote products derived from this software 50 * without specific prior written permission. 51 * 52 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 53 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 54 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 55 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 56 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 57 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 58 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 59 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 60 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 61 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 62 * SUCH DAMAGE. 63 * 64 * @(#)in_pcb.c 8.2 (Berkeley) 1/4/94 65 * $FreeBSD$ 66 */ 67 68 #include "opt_ipsec.h" 69 70 #include <sys/param.h> 71 #include <sys/systm.h> 72 #include <sys/malloc.h> 73 #include <sys/mbuf.h> 74 #include <sys/domain.h> 75 #include <sys/protosw.h> 76 #include <sys/socket.h> 77 #include <sys/socketvar.h> 78 #include <sys/sockio.h> 79 #include <sys/errno.h> 80 #include <sys/time.h> 81 #include <sys/proc.h> 82 #include <sys/jail.h> 83 84 #include <vm/vm_zone.h> 85 86 #include <net/if.h> 87 #include <net/if_types.h> 88 #include <net/route.h> 89 90 #include <netinet/in.h> 91 #include <netinet/in_var.h> 92 #include <netinet/in_systm.h> 93 #include <netinet6/ip6.h> 94 #include <netinet/ip_var.h> 95 #include <netinet6/ip6_var.h> 96 #include <netinet6/nd6.h> 97 #include <netinet/in_pcb.h> 98 #include <netinet6/in6_pcb.h> 99 100 #include "faith.h" 101 102 #ifdef IPSEC 103 #include <netinet6/ipsec.h> 104 #include <netinet6/ah.h> 105 #include <netinet6/ipsec6.h> 106 #include <netinet6/ah6.h> 107 #include <netkey/key.h> 108 #ifdef IPSEC_DEBUG 109 #include <netkey/key_debug.h> 110 #else 111 #define KEYDEBUG(lev,arg) 112 #endif /* IPSEC_DEBUG */ 113 #endif /* IPSEC */ 114 115 struct in6_addr zeroin6_addr; 116 117 int 118 in6_pcbbind(inp, nam, p) 119 register struct inpcb *inp; 120 struct sockaddr *nam; 121 struct proc *p; 122 { 123 struct socket *so = inp->inp_socket; 124 unsigned short *lastport; 125 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)NULL; 126 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo; 127 u_short lport = 0; 128 int wild = 0, reuseport = (so->so_options & SO_REUSEPORT); 129 int error; 130 131 if (!in6_ifaddr) /* XXX broken! */ 132 return (EADDRNOTAVAIL); 133 if (inp->inp_lport || !IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) 134 return(EINVAL); 135 if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0) 136 wild = 1; 137 if (nam) { 138 sin6 = (struct sockaddr_in6 *)nam; 139 if (nam->sa_len != sizeof(*sin6)) 140 return(EINVAL); 141 /* 142 * family check. 143 */ 144 if (nam->sa_family != AF_INET6) 145 return(EAFNOSUPPORT); 146 147 /* 148 * If the scope of the destination is link-local, embed the 149 * interface index in the address. 150 */ 151 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) { 152 /* XXX boundary check is assumed to be already done. */ 153 /* XXX sin6_scope_id is weaker than advanced-api. */ 154 struct in6_pktinfo *pi; 155 if (inp->in6p_outputopts && 156 (pi = inp->in6p_outputopts->ip6po_pktinfo) && 157 pi->ipi6_ifindex) { 158 sin6->sin6_addr.s6_addr16[1] 159 = htons(pi->ipi6_ifindex); 160 } else if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr) 161 && inp->in6p_moptions 162 && inp->in6p_moptions->im6o_multicast_ifp) { 163 sin6->sin6_addr.s6_addr16[1] = 164 htons(inp->in6p_moptions->im6o_multicast_ifp->if_index); 165 } else if (sin6->sin6_scope_id) { 166 /* boundary check */ 167 if (sin6->sin6_scope_id < 0 168 || if_index < sin6->sin6_scope_id) { 169 return ENXIO; /* XXX EINVAL? */ 170 } 171 sin6->sin6_addr.s6_addr16[1] 172 = htons(sin6->sin6_scope_id & 0xffff);/*XXX*/ 173 /* this must be cleared for ifa_ifwithaddr() */ 174 sin6->sin6_scope_id = 0; 175 } 176 } 177 178 lport = sin6->sin6_port; 179 if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) { 180 /* 181 * Treat SO_REUSEADDR as SO_REUSEPORT for multicast; 182 * allow compepte duplication of binding if 183 * SO_REUSEPORT is set, or if SO_REUSEADDR is set 184 * and a multicast address is bound on both 185 * new and duplicated sockets. 186 */ 187 if (so->so_options & SO_REUSEADDR) 188 reuseport = SO_REUSEADDR|SO_REUSEPORT; 189 } else if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) { 190 struct ifaddr *ia = NULL; 191 192 sin6->sin6_port = 0; /* yech... */ 193 if ((ia = ifa_ifwithaddr((struct sockaddr *)sin6)) == 0) 194 return(EADDRNOTAVAIL); 195 196 /* 197 * XXX: bind to an anycast address might accidentally 198 * cause sending a packet with anycast source address. 199 */ 200 if (ia && 201 ((struct in6_ifaddr *)ia)->ia6_flags & 202 (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY| 203 IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) { 204 return(EADDRNOTAVAIL); 205 } 206 } 207 if (lport) { 208 struct inpcb *t; 209 210 /* GROSS */ 211 if (ntohs(lport) < IPV6PORT_RESERVED && p && 212 suser_xxx(0, p, PRISON_ROOT)) 213 return(EACCES); 214 if (so->so_cred->cr_uid != 0 && 215 !IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) { 216 t = in6_pcblookup_local(pcbinfo, 217 &sin6->sin6_addr, lport, 218 INPLOOKUP_WILDCARD); 219 if (t && 220 (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) || 221 !IN6_IS_ADDR_UNSPECIFIED(&t->in6p_laddr) || 222 (t->inp_socket->so_options & 223 SO_REUSEPORT) == 0) && 224 (so->so_cred->cr_uid != 225 t->inp_socket->so_cred->cr_uid)) 226 return (EADDRINUSE); 227 if (ip6_mapped_addr_on != 0 && 228 IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) { 229 struct sockaddr_in sin; 230 231 in6_sin6_2_sin(&sin, sin6); 232 t = in_pcblookup_local(pcbinfo, 233 sin.sin_addr, lport, 234 INPLOOKUP_WILDCARD); 235 if (t && 236 (so->so_cred->cr_uid != 237 t->inp_socket->so_cred->cr_uid) && 238 (ntohl(t->inp_laddr.s_addr) != 239 INADDR_ANY || 240 INP_SOCKAF(so) == 241 INP_SOCKAF(t->inp_socket))) 242 return (EADDRINUSE); 243 } 244 } 245 t = in6_pcblookup_local(pcbinfo, &sin6->sin6_addr, 246 lport, wild); 247 if (t && (reuseport & t->inp_socket->so_options) == 0) 248 return(EADDRINUSE); 249 if (ip6_mapped_addr_on != 0 && 250 IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) { 251 struct sockaddr_in sin; 252 253 in6_sin6_2_sin(&sin, sin6); 254 t = in_pcblookup_local(pcbinfo, sin.sin_addr, 255 lport, wild); 256 if (t && 257 (reuseport & t->inp_socket->so_options) 258 == 0 && 259 (ntohl(t->inp_laddr.s_addr) 260 != INADDR_ANY || 261 INP_SOCKAF(so) == 262 INP_SOCKAF(t->inp_socket))) 263 return (EADDRINUSE); 264 } 265 } 266 inp->in6p_laddr = sin6->sin6_addr; 267 } 268 if (lport == 0) { 269 ushort first, last; 270 int count; 271 272 inp->inp_flags |= INP_ANONPORT; 273 274 if (inp->inp_flags & INP_HIGHPORT) { 275 first = ipport_hifirstauto; /* sysctl */ 276 last = ipport_hilastauto; 277 lastport = &pcbinfo->lasthi; 278 } else if (inp->inp_flags & INP_LOWPORT) { 279 if (p && (error = suser_xxx(0, p, PRISON_ROOT))) 280 return error; 281 first = ipport_lowfirstauto; /* 1023 */ 282 last = ipport_lowlastauto; /* 600 */ 283 lastport = &pcbinfo->lastlow; 284 } else { 285 first = ipport_firstauto; /* sysctl */ 286 last = ipport_lastauto; 287 lastport = &pcbinfo->lastport; 288 } 289 /* 290 * Simple check to ensure all ports are not used up causing 291 * a deadlock here. 292 * 293 * We split the two cases (up and down) so that the direction 294 * is not being tested on each round of the loop. 295 */ 296 if (first > last) { 297 /* 298 * counting down 299 */ 300 count = first - last; 301 302 do { 303 if (count-- < 0) { /* completely used? */ 304 /* 305 * Undo any address bind that may have 306 * occurred above. 307 */ 308 inp->in6p_laddr = in6addr_any; 309 return (EAGAIN); 310 } 311 --*lastport; 312 if (*lastport > first || *lastport < last) 313 *lastport = first; 314 lport = htons(*lastport); 315 } while (in6_pcblookup_local(pcbinfo, 316 &inp->in6p_laddr, lport, wild)); 317 } else { 318 /* 319 * counting up 320 */ 321 count = last - first; 322 323 do { 324 if (count-- < 0) { /* completely used? */ 325 /* 326 * Undo any address bind that may have 327 * occurred above. 328 */ 329 inp->in6p_laddr = in6addr_any; 330 return (EAGAIN); 331 } 332 ++*lastport; 333 if (*lastport < first || *lastport > last) 334 *lastport = first; 335 lport = htons(*lastport); 336 } while (in6_pcblookup_local(pcbinfo, 337 &inp->in6p_laddr, lport, wild)); 338 } 339 } 340 inp->inp_lport = lport; 341 if (in_pcbinshash(inp) != 0) { 342 inp->in6p_laddr = in6addr_any; 343 inp->inp_lport = 0; 344 return (EAGAIN); 345 } 346 inp->in6p_flowinfo = sin6 ? sin6->sin6_flowinfo : 0; /*XXX*/ 347 return(0); 348 } 349 350 /* 351 * Transform old in6_pcbconnect() into an inner subroutine for new 352 * in6_pcbconnect(): Do some validity-checking on the remote 353 * address (in mbuf 'nam') and then determine local host address 354 * (i.e., which interface) to use to access that remote host. 355 * 356 * This preserves definition of in6_pcbconnect(), while supporting a 357 * slightly different version for T/TCP. (This is more than 358 * a bit of a kludge, but cleaning up the internal interfaces would 359 * have forced minor changes in every protocol). 360 */ 361 362 int 363 in6_pcbladdr(inp, nam, plocal_addr6) 364 register struct inpcb *inp; 365 struct sockaddr *nam; 366 struct in6_addr **plocal_addr6; 367 { 368 register struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)nam; 369 struct in6_pktinfo *pi; 370 struct ifnet *ifp = NULL; 371 int error = 0; 372 373 if (nam->sa_len != sizeof (*sin6)) 374 return (EINVAL); 375 if (sin6->sin6_family != AF_INET6) 376 return (EAFNOSUPPORT); 377 if (sin6->sin6_port == 0) 378 return (EADDRNOTAVAIL); 379 380 /* 381 * If the scope of the destination is link-local, embed the interface 382 * index in the address. 383 */ 384 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) { 385 /* XXX boundary check is assumed to be already done. */ 386 /* XXX sin6_scope_id is weaker than advanced-api. */ 387 if (inp->in6p_outputopts && 388 (pi = inp->in6p_outputopts->ip6po_pktinfo) && 389 pi->ipi6_ifindex) { 390 sin6->sin6_addr.s6_addr16[1] = htons(pi->ipi6_ifindex); 391 ifp = ifindex2ifnet[pi->ipi6_ifindex]; 392 } else if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr) && 393 inp->in6p_moptions && 394 inp->in6p_moptions->im6o_multicast_ifp) { 395 sin6->sin6_addr.s6_addr16[1] = 396 htons(inp->in6p_moptions->im6o_multicast_ifp->if_index); 397 ifp = ifindex2ifnet[inp->in6p_moptions->im6o_multicast_ifp->if_index]; 398 } else if (sin6->sin6_scope_id) { 399 /* boundary check */ 400 if (sin6->sin6_scope_id < 0 401 || if_index < sin6->sin6_scope_id) { 402 return ENXIO; /* XXX EINVAL? */ 403 } 404 sin6->sin6_addr.s6_addr16[1] 405 = htons(sin6->sin6_scope_id & 0xffff);/*XXX*/ 406 ifp = ifindex2ifnet[sin6->sin6_scope_id]; 407 } 408 } 409 410 if (in6_ifaddr) { 411 /* 412 * If the destination address is UNSPECIFIED addr, 413 * use the loopback addr, e.g ::1. 414 */ 415 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) 416 sin6->sin6_addr = in6addr_loopback; 417 } 418 { 419 /* 420 * XXX: in6_selectsrc might replace the bound local address 421 * with the address specified by setsockopt(IPV6_PKTINFO). 422 * Is it the intended behavior? 423 */ 424 *plocal_addr6 = in6_selectsrc(sin6, inp->in6p_outputopts, 425 inp->in6p_moptions, 426 &inp->in6p_route, 427 &inp->in6p_laddr, &error); 428 if (*plocal_addr6 == 0) { 429 if (error == 0) 430 error = EADDRNOTAVAIL; 431 return(error); 432 } 433 /* 434 * Don't do pcblookup call here; return interface in 435 * plocal_addr6 436 * and exit to caller, that will do the lookup. 437 */ 438 } 439 440 if (inp->in6p_route.ro_rt) 441 ifp = inp->in6p_route.ro_rt->rt_ifp; 442 443 inp->in6p_ip6_hlim = (u_int8_t)in6_selecthlim(inp, ifp); 444 445 return(0); 446 } 447 448 /* 449 * Outer subroutine: 450 * Connect from a socket to a specified address. 451 * Both address and port must be specified in argument sin. 452 * If don't have a local address for this socket yet, 453 * then pick one. 454 */ 455 int 456 in6_pcbconnect(inp, nam, p) 457 register struct inpcb *inp; 458 struct sockaddr *nam; 459 struct proc *p; 460 { 461 struct in6_addr *addr6; 462 register struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)nam; 463 int error; 464 465 /* 466 * Call inner routine, to assign local interface address. 467 */ 468 if ((error = in6_pcbladdr(inp, nam, &addr6)) != 0) 469 return(error); 470 471 if (in6_pcblookup_hash(inp->inp_pcbinfo, &sin6->sin6_addr, 472 sin6->sin6_port, 473 IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr) 474 ? addr6 : &inp->in6p_laddr, 475 inp->inp_lport, 0, NULL) != NULL) { 476 return (EADDRINUSE); 477 } 478 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) { 479 if (inp->inp_lport == 0) { 480 error = in6_pcbbind(inp, (struct sockaddr *)0, p); 481 if (error) 482 return (error); 483 } 484 inp->in6p_laddr = *addr6; 485 } 486 inp->in6p_faddr = sin6->sin6_addr; 487 inp->inp_fport = sin6->sin6_port; 488 /* 489 * xxx kazu flowlabel is necessary for connect? 490 * but if this line is missing, the garbage value remains. 491 */ 492 inp->in6p_flowinfo = sin6->sin6_flowinfo; 493 if ((inp->in6p_flowinfo & IPV6_FLOWLABEL_MASK) == 0 && 494 ip6_auto_flowlabel != 0) 495 inp->in6p_flowinfo |= 496 (htonl(ip6_flow_seq++) & IPV6_FLOWLABEL_MASK); 497 498 in_pcbrehash(inp); 499 return (0); 500 } 501 502 /* 503 * Return an IPv6 address, which is the most appropriate for given 504 * destination and user specified options. 505 * If necessary, this function lookups the routing table and return 506 * an entry to the caller for later use. 507 */ 508 struct in6_addr * 509 in6_selectsrc(dstsock, opts, mopts, ro, laddr, errorp) 510 struct sockaddr_in6 *dstsock; 511 struct ip6_pktopts *opts; 512 struct ip6_moptions *mopts; 513 struct route_in6 *ro; 514 struct in6_addr *laddr; 515 int *errorp; 516 { 517 struct in6_addr *dst; 518 struct in6_ifaddr *ia6 = 0; 519 struct in6_pktinfo *pi = NULL; 520 521 dst = &dstsock->sin6_addr; 522 *errorp = 0; 523 524 /* 525 * If the source address is explicitly specified by the caller, 526 * use it. 527 */ 528 if (opts && (pi = opts->ip6po_pktinfo) && 529 !IN6_IS_ADDR_UNSPECIFIED(&pi->ipi6_addr)) 530 return(&pi->ipi6_addr); 531 532 /* 533 * If the source address is not specified but the socket(if any) 534 * is already bound, use the bound address. 535 */ 536 if (laddr && !IN6_IS_ADDR_UNSPECIFIED(laddr)) 537 return(laddr); 538 539 /* 540 * If the caller doesn't specify the source address but 541 * the outgoing interface, use an address associated with 542 * the interface. 543 */ 544 if (pi && pi->ipi6_ifindex) { 545 /* XXX boundary check is assumed to be already done. */ 546 ia6 = in6_ifawithscope(ifindex2ifnet[pi->ipi6_ifindex], 547 dst); 548 if (ia6 == 0) { 549 *errorp = EADDRNOTAVAIL; 550 return(0); 551 } 552 return(&satosin6(&ia6->ia_addr)->sin6_addr); 553 } 554 555 /* 556 * If the destination address is a link-local unicast address or 557 * a multicast address, and if the outgoing interface is specified 558 * by the sin6_scope_id filed, use an address associated with the 559 * interface. 560 * XXX: We're now trying to define more specific semantics of 561 * sin6_scope_id field, so this part will be rewritten in 562 * the near future. 563 */ 564 if ((IN6_IS_ADDR_LINKLOCAL(dst) || IN6_IS_ADDR_MULTICAST(dst)) && 565 dstsock->sin6_scope_id) { 566 /* 567 * I'm not sure if boundary check for scope_id is done 568 * somewhere... 569 */ 570 if (dstsock->sin6_scope_id < 0 || 571 if_index < dstsock->sin6_scope_id) { 572 *errorp = ENXIO; /* XXX: better error? */ 573 return(0); 574 } 575 ia6 = in6_ifawithscope(ifindex2ifnet[dstsock->sin6_scope_id], 576 dst); 577 if (ia6 == 0) { 578 *errorp = EADDRNOTAVAIL; 579 return(0); 580 } 581 return(&satosin6(&ia6->ia_addr)->sin6_addr); 582 } 583 584 /* 585 * If the destination address is a multicast address and 586 * the outgoing interface for the address is specified 587 * by the caller, use an address associated with the interface. 588 * There is a sanity check here; if the destination has node-local 589 * scope, the outgoing interfacde should be a loopback address. 590 * Even if the outgoing interface is not specified, we also 591 * choose a loopback interface as the outgoing interface. 592 */ 593 if (IN6_IS_ADDR_MULTICAST(dst)) { 594 struct ifnet *ifp = mopts ? mopts->im6o_multicast_ifp : NULL; 595 596 if (ifp == NULL && IN6_IS_ADDR_MC_NODELOCAL(dst)) { 597 ifp = &loif[0]; 598 } 599 600 if (ifp) { 601 ia6 = in6_ifawithscope(ifp, dst); 602 if (ia6 == 0) { 603 *errorp = EADDRNOTAVAIL; 604 return(0); 605 } 606 return(&ia6->ia_addr.sin6_addr); 607 } 608 } 609 610 /* 611 * If the next hop address for the packet is specified 612 * by caller, use an address associated with the route 613 * to the next hop. 614 */ 615 { 616 struct sockaddr_in6 *sin6_next; 617 struct rtentry *rt; 618 619 if (opts && opts->ip6po_nexthop) { 620 sin6_next = satosin6(opts->ip6po_nexthop); 621 rt = nd6_lookup(&sin6_next->sin6_addr, 1, NULL); 622 if (rt) { 623 ia6 = in6_ifawithscope(rt->rt_ifp, dst); 624 if (ia6 == 0) 625 ia6 = ifatoia6(rt->rt_ifa); 626 } 627 if (ia6 == 0) { 628 *errorp = EADDRNOTAVAIL; 629 return(0); 630 } 631 return(&satosin6(&ia6->ia_addr)->sin6_addr); 632 } 633 } 634 635 /* 636 * If route is known or can be allocated now, 637 * our src addr is taken from the i/f, else punt. 638 */ 639 if (ro) { 640 if (ro->ro_rt && 641 !IN6_ARE_ADDR_EQUAL(&satosin6(&ro->ro_dst)->sin6_addr, dst)) { 642 RTFREE(ro->ro_rt); 643 ro->ro_rt = (struct rtentry *)0; 644 } 645 if (ro->ro_rt == (struct rtentry *)0 || 646 ro->ro_rt->rt_ifp == (struct ifnet *)0) { 647 /* No route yet, so try to acquire one */ 648 bzero(&ro->ro_dst, sizeof(struct sockaddr_in6)); 649 ro->ro_dst.sin6_family = AF_INET6; 650 ro->ro_dst.sin6_len = sizeof(struct sockaddr_in6); 651 ro->ro_dst.sin6_addr = *dst; 652 if (IN6_IS_ADDR_MULTICAST(dst)) { 653 ro->ro_rt = rtalloc1(&((struct route *)ro) 654 ->ro_dst, 0, 0UL); 655 } else { 656 rtalloc((struct route *)ro); 657 } 658 } 659 660 /* 661 * in_pcbconnect() checks out IFF_LOOPBACK to skip using 662 * the address. But we don't know why it does so. 663 * It is necessary to ensure the scope even for lo0 664 * so doesn't check out IFF_LOOPBACK. 665 */ 666 667 if (ro->ro_rt) { 668 ia6 = in6_ifawithscope(ro->ro_rt->rt_ifa->ifa_ifp, dst); 669 if (ia6 == 0) /* xxx scope error ?*/ 670 ia6 = ifatoia6(ro->ro_rt->rt_ifa); 671 } 672 if (ia6 == 0) { 673 *errorp = EHOSTUNREACH; /* no route */ 674 return(0); 675 } 676 return(&satosin6(&ia6->ia_addr)->sin6_addr); 677 } 678 679 *errorp = EADDRNOTAVAIL; 680 return(0); 681 } 682 683 /* 684 * Default hop limit selection. The precedence is as follows: 685 * 1. Hoplimit valued specified via ioctl. 686 * 2. (If the outgoing interface is detected) the current 687 * hop limit of the interface specified by router advertisement. 688 * 3. The system default hoplimit. 689 */ 690 int 691 in6_selecthlim(in6p, ifp) 692 struct in6pcb *in6p; 693 struct ifnet *ifp; 694 { 695 if (in6p && in6p->in6p_hops >= 0) 696 return(in6p->in6p_hops); 697 else if (ifp) 698 return(nd_ifinfo[ifp->if_index].chlim); 699 else 700 return(ip6_defhlim); 701 } 702 703 void 704 in6_pcbdisconnect(inp) 705 struct inpcb *inp; 706 { 707 bzero((caddr_t)&inp->in6p_faddr, sizeof(inp->in6p_faddr)); 708 inp->inp_fport = 0; 709 in_pcbrehash(inp); 710 if (inp->inp_socket->so_state & SS_NOFDREF) 711 in6_pcbdetach(inp); 712 } 713 714 void 715 in6_pcbdetach(inp) 716 struct inpcb *inp; 717 { 718 struct socket *so = inp->inp_socket; 719 struct inpcbinfo *ipi = inp->inp_pcbinfo; 720 721 #ifdef IPSEC 722 if (sotoinpcb(so) != 0) 723 key_freeso(so); 724 ipsec6_delete_pcbpolicy(inp); 725 #endif /* IPSEC */ 726 inp->inp_gencnt = ++ipi->ipi_gencnt; 727 in_pcbremlists(inp); 728 sotoinpcb(so) = 0; 729 sofree(so); 730 if (inp->in6p_options) 731 m_freem(inp->in6p_options); 732 if (inp->in6p_outputopts) { 733 if (inp->in6p_outputopts->ip6po_rthdr && 734 inp->in6p_outputopts->ip6po_route.ro_rt) 735 RTFREE(inp->in6p_outputopts->ip6po_route.ro_rt); 736 if (inp->in6p_outputopts->ip6po_m) 737 (void)m_free(inp->in6p_outputopts->ip6po_m); 738 free(inp->in6p_outputopts, M_IP6OPT); 739 } 740 if (inp->in6p_route.ro_rt) 741 rtfree(inp->in6p_route.ro_rt); 742 ip6_freemoptions(inp->in6p_moptions); 743 744 /* Check and free IPv4 related resources in case of mapped addr */ 745 if (inp->inp_options) 746 (void)m_free(inp->inp_options); 747 ip_freemoptions(inp->inp_moptions); 748 749 inp->inp_vflag = 0; 750 zfreei(ipi->ipi_zone, inp); 751 } 752 753 /* 754 * The calling convention of in6_setsockaddr() and in6_setpeeraddr() was 755 * modified to match the pru_sockaddr() and pru_peeraddr() entry points 756 * in struct pr_usrreqs, so that protocols can just reference then directly 757 * without the need for a wrapper function. The socket must have a valid 758 * (i.e., non-nil) PCB, but it should be impossible to get an invalid one 759 * except through a kernel programming error, so it is acceptable to panic 760 * (or in this case trap) if the PCB is invalid. (Actually, we don't trap 761 * because there actually /is/ a programming error somewhere... XXX) 762 */ 763 int 764 in6_setsockaddr(so, nam) 765 struct socket *so; 766 struct sockaddr **nam; 767 { 768 int s; 769 register struct inpcb *inp; 770 register struct sockaddr_in6 *sin6; 771 772 /* 773 * Do the malloc first in case it blocks. 774 */ 775 MALLOC(sin6, struct sockaddr_in6 *, sizeof *sin6, M_SONAME, M_WAITOK); 776 bzero(sin6, sizeof *sin6); 777 sin6->sin6_family = AF_INET6; 778 sin6->sin6_len = sizeof(*sin6); 779 780 s = splnet(); 781 inp = sotoinpcb(so); 782 if (!inp) { 783 splx(s); 784 free(sin6, M_SONAME); 785 return EINVAL; 786 } 787 sin6->sin6_port = inp->inp_lport; 788 sin6->sin6_addr = inp->in6p_laddr; 789 splx(s); 790 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 791 sin6->sin6_scope_id = ntohs(sin6->sin6_addr.s6_addr16[1]); 792 else 793 sin6->sin6_scope_id = 0; /*XXX*/ 794 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 795 sin6->sin6_addr.s6_addr16[1] = 0; 796 797 *nam = (struct sockaddr *)sin6; 798 return 0; 799 } 800 801 int 802 in6_setpeeraddr(so, nam) 803 struct socket *so; 804 struct sockaddr **nam; 805 { 806 int s; 807 struct inpcb *inp; 808 register struct sockaddr_in6 *sin6; 809 810 /* 811 * Do the malloc first in case it blocks. 812 */ 813 MALLOC(sin6, struct sockaddr_in6 *, sizeof(*sin6), M_SONAME, M_WAITOK); 814 bzero((caddr_t)sin6, sizeof (*sin6)); 815 sin6->sin6_family = AF_INET6; 816 sin6->sin6_len = sizeof(struct sockaddr_in6); 817 818 s = splnet(); 819 inp = sotoinpcb(so); 820 if (!inp) { 821 splx(s); 822 free(sin6, M_SONAME); 823 return EINVAL; 824 } 825 sin6->sin6_port = inp->inp_fport; 826 sin6->sin6_addr = inp->in6p_faddr; 827 splx(s); 828 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 829 sin6->sin6_scope_id = ntohs(sin6->sin6_addr.s6_addr16[1]); 830 else 831 sin6->sin6_scope_id = 0; /*XXX*/ 832 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 833 sin6->sin6_addr.s6_addr16[1] = 0; 834 835 *nam = (struct sockaddr *)sin6; 836 return 0; 837 } 838 839 int 840 in6_mapped_sockaddr(struct socket *so, struct sockaddr **nam) 841 { 842 struct inpcb *inp = sotoinpcb(so); 843 int error; 844 845 if (inp == NULL) 846 return EINVAL; 847 if (inp->inp_vflag & INP_IPV4) { 848 error = in_setsockaddr(so, nam); 849 if (error == 0) 850 in6_sin_2_v4mapsin6_in_sock(nam); 851 } else 852 error = in6_setsockaddr(so, nam); 853 854 return error; 855 } 856 857 int 858 in6_mapped_peeraddr(struct socket *so, struct sockaddr **nam) 859 { 860 struct inpcb *inp = sotoinpcb(so); 861 int error; 862 863 if (inp == NULL) 864 return EINVAL; 865 if (inp->inp_vflag & INP_IPV4) { 866 error = in_setpeeraddr(so, nam); 867 if (error == 0) 868 in6_sin_2_v4mapsin6_in_sock(nam); 869 } else 870 error = in6_setpeeraddr(so, nam); 871 872 return error; 873 } 874 875 /* 876 * Pass some notification to all connections of a protocol 877 * associated with address dst. The local address and/or port numbers 878 * may be specified to limit the search. The "usual action" will be 879 * taken, depending on the ctlinput cmd. The caller must filter any 880 * cmds that are uninteresting (e.g., no error in the map). 881 * Call the protocol specific routine (if any) to report 882 * any errors for each matching socket. 883 * 884 * Must be called at splnet. 885 */ 886 void 887 in6_pcbnotify(head, dst, fport_arg, laddr6, lport_arg, cmd, notify) 888 struct inpcbhead *head; 889 struct sockaddr *dst; 890 u_int fport_arg, lport_arg; 891 struct in6_addr *laddr6; 892 int cmd; 893 void (*notify) __P((struct inpcb *, int)); 894 { 895 struct inpcb *inp, *oinp; 896 struct in6_addr faddr6; 897 u_short fport = fport_arg, lport = lport_arg; 898 int errno, s; 899 900 if ((unsigned)cmd > PRC_NCMDS || dst->sa_family != AF_INET6) 901 return; 902 faddr6 = ((struct sockaddr_in6 *)dst)->sin6_addr; 903 if (IN6_IS_ADDR_UNSPECIFIED(&faddr6)) 904 return; 905 906 /* 907 * Redirects go to all references to the destination, 908 * and use in_rtchange to invalidate the route cache. 909 * Dead host indications: notify all references to the destination. 910 * Otherwise, if we have knowledge of the local port and address, 911 * deliver only to that socket. 912 */ 913 if (PRC_IS_REDIRECT(cmd) || cmd == PRC_HOSTDEAD) { 914 fport = 0; 915 lport = 0; 916 bzero((caddr_t)laddr6, sizeof(*laddr6)); 917 if (cmd != PRC_HOSTDEAD) 918 notify = in6_rtchange; 919 } 920 errno = inet6ctlerrmap[cmd]; 921 s = splnet(); 922 for (inp = LIST_FIRST(head); inp != NULL;) { 923 if ((inp->inp_vflag & INP_IPV6) == 0) { 924 inp = LIST_NEXT(inp, inp_list); 925 continue; 926 } 927 if (!IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, &faddr6) || 928 inp->inp_socket == 0 || 929 (lport && inp->inp_lport != lport) || 930 (!IN6_IS_ADDR_UNSPECIFIED(laddr6) && 931 !IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr6)) || 932 (fport && inp->inp_fport != fport)) { 933 inp = LIST_NEXT(inp, inp_list); 934 continue; 935 } 936 oinp = inp; 937 inp = LIST_NEXT(inp, inp_list); 938 if (notify) 939 (*notify)(oinp, errno); 940 } 941 splx(s); 942 } 943 944 /* 945 * Lookup a PCB based on the local address and port. 946 */ 947 struct inpcb * 948 in6_pcblookup_local(pcbinfo, laddr, lport_arg, wild_okay) 949 struct inpcbinfo *pcbinfo; 950 struct in6_addr *laddr; 951 u_int lport_arg; 952 int wild_okay; 953 { 954 register struct inpcb *inp; 955 int matchwild = 3, wildcard; 956 u_short lport = lport_arg; 957 958 if (!wild_okay) { 959 struct inpcbhead *head; 960 /* 961 * Look for an unconnected (wildcard foreign addr) PCB that 962 * matches the local address and port we're looking for. 963 */ 964 head = &pcbinfo->hashbase[INP_PCBHASH(INADDR_ANY, lport, 0, 965 pcbinfo->hashmask)]; 966 LIST_FOREACH(inp, head, inp_hash) { 967 if ((inp->inp_vflag & INP_IPV6) == 0) 968 continue; 969 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) && 970 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) && 971 inp->inp_lport == lport) { 972 /* 973 * Found. 974 */ 975 return (inp); 976 } 977 } 978 /* 979 * Not found. 980 */ 981 return (NULL); 982 } else { 983 struct inpcbporthead *porthash; 984 struct inpcbport *phd; 985 struct inpcb *match = NULL; 986 /* 987 * Best fit PCB lookup. 988 * 989 * First see if this local port is in use by looking on the 990 * port hash list. 991 */ 992 porthash = &pcbinfo->porthashbase[INP_PCBPORTHASH(lport, 993 pcbinfo->porthashmask)]; 994 LIST_FOREACH(phd, porthash, phd_hash) { 995 if (phd->phd_port == lport) 996 break; 997 } 998 if (phd != NULL) { 999 /* 1000 * Port is in use by one or more PCBs. Look for best 1001 * fit. 1002 */ 1003 LIST_FOREACH(inp, &phd->phd_pcblist, inp_portlist) { 1004 wildcard = 0; 1005 if ((inp->inp_vflag & INP_IPV6) == 0) 1006 continue; 1007 if (!IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr)) 1008 wildcard++; 1009 if (!IN6_IS_ADDR_UNSPECIFIED( 1010 &inp->in6p_laddr)) { 1011 if (IN6_IS_ADDR_UNSPECIFIED(laddr)) 1012 wildcard++; 1013 else if (!IN6_ARE_ADDR_EQUAL( 1014 &inp->in6p_laddr, laddr)) 1015 continue; 1016 } else { 1017 if (!IN6_IS_ADDR_UNSPECIFIED(laddr)) 1018 wildcard++; 1019 } 1020 if (wildcard < matchwild) { 1021 match = inp; 1022 matchwild = wildcard; 1023 if (matchwild == 0) { 1024 break; 1025 } 1026 } 1027 } 1028 } 1029 return (match); 1030 } 1031 } 1032 1033 /* 1034 * Check for alternatives when higher level complains 1035 * about service problems. For now, invalidate cached 1036 * routing information. If the route was created dynamically 1037 * (by a redirect), time to try a default gateway again. 1038 */ 1039 void 1040 in6_losing(in6p) 1041 struct inpcb *in6p; 1042 { 1043 struct rtentry *rt; 1044 struct rt_addrinfo info; 1045 1046 if ((rt = in6p->in6p_route.ro_rt) != NULL) { 1047 in6p->in6p_route.ro_rt = 0; 1048 bzero((caddr_t)&info, sizeof(info)); 1049 info.rti_info[RTAX_DST] = 1050 (struct sockaddr *)&in6p->in6p_route.ro_dst; 1051 info.rti_info[RTAX_GATEWAY] = rt->rt_gateway; 1052 info.rti_info[RTAX_NETMASK] = rt_mask(rt); 1053 rt_missmsg(RTM_LOSING, &info, rt->rt_flags, 0); 1054 if (rt->rt_flags & RTF_DYNAMIC) 1055 (void)rtrequest(RTM_DELETE, rt_key(rt), 1056 rt->rt_gateway, rt_mask(rt), rt->rt_flags, 1057 (struct rtentry **)0); 1058 else 1059 /* 1060 * A new route can be allocated 1061 * the next time output is attempted. 1062 */ 1063 rtfree(rt); 1064 } 1065 } 1066 1067 /* 1068 * After a routing change, flush old routing 1069 * and allocate a (hopefully) better one. 1070 */ 1071 void 1072 in6_rtchange(inp, errno) 1073 struct inpcb *inp; 1074 int errno; 1075 { 1076 if (inp->in6p_route.ro_rt) { 1077 rtfree(inp->in6p_route.ro_rt); 1078 inp->in6p_route.ro_rt = 0; 1079 /* 1080 * A new route can be allocated the next time 1081 * output is attempted. 1082 */ 1083 } 1084 } 1085 1086 /* 1087 * Lookup PCB in hash list. 1088 */ 1089 struct inpcb * 1090 in6_pcblookup_hash(pcbinfo, faddr, fport_arg, laddr, lport_arg, wildcard, ifp) 1091 struct inpcbinfo *pcbinfo; 1092 struct in6_addr *faddr, *laddr; 1093 u_int fport_arg, lport_arg; 1094 int wildcard; 1095 struct ifnet *ifp; 1096 { 1097 struct inpcbhead *head; 1098 register struct inpcb *inp; 1099 u_short fport = fport_arg, lport = lport_arg; 1100 1101 /* 1102 * First look for an exact match. 1103 */ 1104 head = &pcbinfo->hashbase[INP_PCBHASH(faddr->s6_addr32[3] /* XXX */, 1105 lport, fport, 1106 pcbinfo->hashmask)]; 1107 LIST_FOREACH(inp, head, inp_hash) { 1108 if ((inp->inp_vflag & INP_IPV6) == 0) 1109 continue; 1110 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, faddr) && 1111 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) && 1112 inp->inp_fport == fport && 1113 inp->inp_lport == lport) { 1114 /* 1115 * Found. 1116 */ 1117 return (inp); 1118 } 1119 } 1120 if (wildcard) { 1121 struct inpcb *local_wild = NULL; 1122 1123 head = &pcbinfo->hashbase[INP_PCBHASH(INADDR_ANY, lport, 0, 1124 pcbinfo->hashmask)]; 1125 LIST_FOREACH(inp, head, inp_hash) { 1126 if ((inp->inp_vflag & INP_IPV6) == 0) 1127 continue; 1128 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) && 1129 inp->inp_lport == lport) { 1130 #if defined(NFAITH) && NFAITH > 0 1131 if (ifp && ifp->if_type == IFT_FAITH && 1132 (inp->inp_flags & INP_FAITH) == 0) 1133 continue; 1134 #endif 1135 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, 1136 laddr)) 1137 return (inp); 1138 else if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) 1139 local_wild = inp; 1140 } 1141 } 1142 return (local_wild); 1143 } 1144 1145 /* 1146 * Not found. 1147 */ 1148 return (NULL); 1149 } 1150 1151 void 1152 init_sin6(struct sockaddr_in6 *sin6, struct mbuf *m) 1153 { 1154 struct ip6_hdr *ip; 1155 1156 ip = mtod(m, struct ip6_hdr *); 1157 bzero(sin6, sizeof(*sin6)); 1158 sin6->sin6_len = sizeof(*sin6); 1159 sin6->sin6_family = AF_INET6; 1160 sin6->sin6_addr = ip->ip6_src; 1161 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 1162 sin6->sin6_addr.s6_addr16[1] = 0; 1163 sin6->sin6_scope_id = 1164 (m->m_pkthdr.rcvif && IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) 1165 ? m->m_pkthdr.rcvif->if_index : 0; 1166 1167 return; 1168 } 1169